[Policy CSP](policy-configuration-service-provider.md) |
Added the following new policies for Windows 10, version 1709:
-- CredentialProviders/EnableWindowsAutoPilotResetCredentials
+- Browser/LockdownFavorites
+- Browser/ProvisionFavorites
+- CredentialProviders/DisableAutomaticReDeploymentCredentials
- DeviceGuard/EnableVirtualizationBasedSecurity
- DeviceGuard/RequirePlatformSecurityFeatures
- DeviceGuard/LsaCfgFlags
+- ExploitGuard/ExploitProtectionSettings
+- Games/AllowAdvancedGamingServices
+- LocalPoliciesSecurityOptions/Accounts_BlockMicrosoftAccounts
+- LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatus
+- LocalPoliciesSecurityOptions/Accounts_EnableGuestAccountStatus
+- LocalPoliciesSecurityOptions/Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly
+- LocalPoliciesSecurityOptions/Accounts_RenameAdministratorAccount
+- LocalPoliciesSecurityOptions/Accounts_RenameGuestAccount
+- LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked
+- LocalPoliciesSecurityOptions/Interactivelogon_DoNotDisplayLastSignedIn
+- LocalPoliciesSecurityOptions/Interactivelogon_DoNotDisplayUsernameAtSignIn
+- LocalPoliciesSecurityOptions/Interactivelogon_DoNotRequireCTRLALTDEL
+- LocalPoliciesSecurityOptions/InteractiveLogon_MachineInactivityLimit
+- LocalPoliciesSecurityOptions/InteractiveLogon_MessageTextForUsersAttemptingToLogOn
+- LocalPoliciesSecurityOptions/InteractiveLogon_MessageTitleForUsersAttemptingToLogOn
+- LocalPoliciesSecurityOptions/NetworkSecurity_AllowPKU2UAuthenticationRequests
+- LocalPoliciesSecurityOptions/RecoveryConsole_AllowAutomaticAdministrativeLogon
+- LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn
+- LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation
+- LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForAdministrators
+- LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers
+- LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateExecutableFilesThatAreSignedAndValidated
+- LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations
+- LocalPoliciesSecurityOptions/UserAccountControl_RunAllAdministratorsInAdminApprovalMode
+- LocalPoliciesSecurityOptions/UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation
+- LocalPoliciesSecurityOptions/UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations
- Power/DisplayOffTimeoutOnBattery
- Power/DisplayOffTimeoutPluggedIn
- Power/HibernateTimeoutOnBattery
- Power/HibernateTimeoutPluggedIn
- Power/StandbyTimeoutOnBattery
- Power/StandbyTimeoutPluggedIn
+- Privacy/EnableActivityFeed
+- Privacy/PublishUserActivities
- Defender/AttackSurfaceReductionOnlyExclusions
- Defender/AttackSurfaceReductionRules
- Defender/CloudBlockLevel
- Defender/CloudExtendedTimeout
-- Defender/EnableGuardMyFolders
+- Defender/ControlledFolderAccessAllowedApplications
+- Defender/ControlledFolderAccessProtectedFolders
+- Defender/EnableControlledFolderAccess
- Defender/EnableNetworkProtection
-- Defender/GuardedFoldersAllowedApplications
-- Defender/GuardedFoldersList
- Education/DefaultPrinterName
- Education/PreventAddingNewPrinters
- Education/PrinterNames
+- Search/AllowCloudSearch
- Security/ClearTPMIfNotReady
+- System/LimitEnhancedDiagnosticDataWindowsAnalytics
+- Update/AllowAutoWindowsUpdateDownloadOverMeteredNetwork
+- Update/DisableDualScan
- Update/ScheduledInstallEveryWeek
- Update/ScheduledInstallFirstWeek
- Update/ScheduledInstallFourthWeek
@@ -1280,6 +1337,166 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
## Change history in MDM documentation
+### September 2017
+
+
+
+
+
+
+
+
+
+
+
+[Policy CSP](policy-configuration-service-provider.md) |
+Added the following new policies for Windows 10, version 1709:
+
+- Search/AllowCloudSearch
+- System/LimitEnhancedDiagnosticDataWindowsAnalytics
+
+ |
+
+
+
+### August 2017
+
+
+
+
+
+
+
+
+
+
+
+[Enable ADMX-backed policies in MDM](enable-admx-backed-policies-in-mdm.md) |
+Added new step-by-step guide to enable ADMX-backed policies.
+ |
+
+[Mobile device enrollment](mobile-device-enrollment.md) |
+Added the following statement:
+
+- Devices that are joined to an on-premise Active Directory can enroll into MDM via the Work access page in Settings. However, the enrollment can only target the user enrolled with user-specific policies. Device targeted policies will continue to impact all users of the device.
+
+ |
+
+[CM\_CellularEntries CSP](cm-cellularentries-csp.md) |
+Updated the description of the PuposeGroups node to add the GUID for applications. This node is required instead of optional.
+ |
+
+[EnterpriseDataProtection CSP](enterprisedataprotection-csp.md) |
+Updated the Settings/EDPEnforcementLevel values to the following:
+
+- 0 (default) – Off / No protection (decrypts previously protected data).
+- 1 – Silent mode (encrypt and audit only).
+- 2 – Allow override mode (encrypt, prompt and allow overrides, and audit).
+- 3 – Hides overrides (encrypt, prompt but hide overrides, and audit).
+
+ |
+
+[AppLocker CSP](applocker-csp.md) |
+Added two new SyncML examples (to disable the calendar app and to block usage of the map app) in [Whitelist examples](applocker-csp.md#whitelist-examples).
+ |
+
+[DeviceManageability CSP](devicemanageability-csp.md) |
+Added the following settings in Windows 10, version 1709:
+
+- Provider/_ProviderID_/ConfigInfo
+- Provider/_ProviderID_/EnrollmentInfo
+
+ |
+
+[Office CSP](office-csp.md) |
+Added the following setting in Windows 10, version 1709:
+
+- Installation/CurrentStatus
+
+ |
+
+[BitLocker CSP](bitlocker-csp.md) |
+Added information to the ADMX-backed policies. Changed the minimum personal identification number (PIN) length to 4 digits in SystemDrivesRequireStartupAuthentication and SystemDrivesMinimumPINLength in Windows 10, version 1709.
+ |
+
+[Firewall CSP](firewall-csp.md) |
+Updated the CSP and DDF topics. Here are the changes:
+
+- Removed the two settings - FirewallRules/FirewallRuleName/FriendlyName and FirewallRules/FirewallRuleName/IcmpTypesAndCodes.
+- Changed some data types from integer to bool.
+- Updated the list of supported operations for some settings.
+- Added default values.
+
+ |
+
+[Policy DDF file](policy-ddf-file.md) |
+Added another Policy DDF file [download](http://download.microsoft.com/download/6/1/C/61C022FD-6F5D-4F73-9047-17F630899DC4/PolicyDDF_all_version1607_8C.xml) for the 8C release of Windows 10, version 1607, which added the following policies:
+
+- Browser/AllowMicrosoftCompatibilityList
+- Update/DisableDualScan
+- Update/FillEmptyContentUrls
+
+ |
+
+[Policy CSP](policy-configuration-service-provider.md) |
+Added the following new policies for Windows 10, version 1709:
+
+- Browser/ProvisionFavorites
+- Browser/LockdownFavorites
+- ExploitGuard/ExploitProtectionSettings
+- Games/AllowAdvancedGamingServices
+- LocalPoliciesSecurityOptions/Accounts_BlockMicrosoftAccounts
+- LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatus
+- LocalPoliciesSecurityOptions/Accounts_EnableGuestAccountStatus
+- LocalPoliciesSecurityOptions/Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly
+- LocalPoliciesSecurityOptions/Accounts_RenameAdministratorAccount
+- LocalPoliciesSecurityOptions/Accounts_RenameGuestAccount
+- LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked
+- LocalPoliciesSecurityOptions/Interactivelogon_DoNotDisplayLastSignedIn
+- LocalPoliciesSecurityOptions/Interactivelogon_DoNotDisplayUsernameAtSignIn
+- LocalPoliciesSecurityOptions/Interactivelogon_DoNotRequireCTRLALTDEL
+- LocalPoliciesSecurityOptions/InteractiveLogon_MachineInactivityLimit
+- LocalPoliciesSecurityOptions/InteractiveLogon_MessageTextForUsersAttemptingToLogOn
+- LocalPoliciesSecurityOptions/InteractiveLogon_MessageTitleForUsersAttemptingToLogOn
+- LocalPoliciesSecurityOptions/NetworkSecurity_AllowPKU2UAuthenticationRequests
+- LocalPoliciesSecurityOptions/RecoveryConsole_AllowAutomaticAdministrativeLogon
+- LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn
+- LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation
+- LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForAdministrators
+- LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers
+- LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateExecutableFilesThatAreSignedAndValidated
+- LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations
+- LocalPoliciesSecurityOptions/UserAccountControl_RunAllAdministratorsInAdminApprovalMode
+- LocalPoliciesSecurityOptions/UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation
+- LocalPoliciesSecurityOptions/UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations
+- Privacy/EnableActivityFeed
+- Privacy/PublishUserActivities
+- Update/DisableDualScan
+- Update/AllowAutoWindowsUpdateDownloadOverMeteredNetwork
+
+Changed the name of new policy to CredentialProviders/DisableAutomaticReDeploymentCredentials from CredentialProviders/EnableWindowsAutoPilotResetCredentials.
+Changed the names of the following policies:
+
+- Defender/GuardedFoldersAllowedApplications to Defender/ControlledFolderAccessAllowedApplications
+- Defender/GuardedFoldersList to Defender/ControlledFolderAccessProtectedFolders
+- Defender/EnableGuardMyFolders to Defender/EnableControlledFolderAccess
+
+Added links to the additional [ADMX-backed BitLocker policies](policy-csp-bitlocker.md).
+There were issues reported with the previous release of the following policies. These issues were fixed in Window 10, version 1709:
+
+- Privacy/AllowAutoAcceptPairingAndPrivacyConsentPrompts
+- Start/HideAppList
+
+ |
+
+
+
### July 2017
@@ -1313,7 +1530,7 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
- Education/DefaultPrinterName
- Education/PreventAddingNewPrinters
-- Education/PrinterNames
+- Education/PrinterNames
- Security/ClearTPMIfNotReady
- WindowsDefenderSecurityCenter/CompanyName
- WindowsDefenderSecurityCenter/DisableAppBrowserUI
@@ -1881,11 +2098,10 @@ Also Added [Firewall DDF file](firewall-ddf-file.md).
- TimeLanguageSettings/AllowSet24HourClock
- Update/ActiveHoursMaxRange
- Update/AutoRestartNotificationSchedule
-- Update/AutoRestartNotificationStyle
- Update/AutoRestartRequiredNotificationDismissal
- Update/EngagedRestartDeadline
- Update/EngagedRestartSnoozeSchedule
-- Update/EngagedRestartTransistionSchedule
+- Update/EngagedRestartTransitionSchedule
- Update/SetAutoRestartNotificationDisable
- WindowsLogon/HideFastUserSwitching
diff --git a/windows/client-management/mdm/office-csp.md b/windows/client-management/mdm/office-csp.md
index 8b62bdd0c7..96b82f9aa7 100644
--- a/windows/client-management/mdm/office-csp.md
+++ b/windows/client-management/mdm/office-csp.md
@@ -6,11 +6,14 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 06/19/2017
+ms.date: 08/22/2017
---
# Office CSP
+> [!WARNING]
+> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
+
The Office configuration service provider (CSP) enables a Microsoft Office client to be installed on a device via the Office Deployment Tool. For more information, see [Configuration options for the Office Deployment Tool](https://technet.microsoft.com/en-us/library/jj219426.aspx).
This CSP was added in Windows 10, version 1703.
@@ -38,7 +41,7 @@ The following diagram shows the Office configuration service provider in tree fo
**Install**
-Installs office by using the XML data specified in the configuration.xml file.
+ Installs Office by using the XML data specified in the configuration.xml file.
The supported operations are Get and Execute.
@@ -48,13 +51,18 @@ The following diagram shows the Office configuration service provider in tree fo
The only supported operation is Get.
+**CurrentStatus**
+
+ Returns an XML of current Office 365 installation status on the device.
+
+ The only supported operation is Get.
## Examples
Sample SyncML to install Office 365 Business Retail from current channel.
```syntax
-
+
7
@@ -76,7 +84,7 @@ Sample SyncML to install Office 365 Business Retail from current channel.
To uninstall the Office 365 from the system:
```syntax
-
+
7
@@ -95,6 +103,24 @@ To uninstall the Office 365 from the system:
```
+To get the current status of Office 365 on the device.
+
+``` syntax
+
+
+
+ 7
+ -
+
+ ./Vendor/MSFT/Office/Installation/CurrentStatus
+
+
+
+
+
+
+```
+
## Status code
diff --git a/windows/client-management/mdm/office-ddf.md b/windows/client-management/mdm/office-ddf.md
index 0fd89434b4..ebd7f2b843 100644
--- a/windows/client-management/mdm/office-ddf.md
+++ b/windows/client-management/mdm/office-ddf.md
@@ -7,11 +7,14 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 06/19/2017
+ms.date: 08/22/2017
---
# Office DDF
+> [!WARNING]
+> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
+
This topic shows the OMA DM device description framework (DDF) for the **Office** configuration service provider. DDF files are used only with OMA DM provisioning XML.
You can download the DDF files from the links below:
@@ -19,7 +22,7 @@ You can download the DDF files from the links below:
- [Download all the DDF files for Windows 10, version 1703](http://download.microsoft.com/download/C/7/C/C7C94663-44CF-4221-ABCA-BC895F42B6C2/Windows10_1703_DDF_download.zip)
- [Download all the DDF files for Windows 10, version 1607](http://download.microsoft.com/download/2/3/E/23E27D6B-6E23-4833-B143-915EDA3BDD44/Windows10_1607_DDF.zip)
-The XML below is the current version for this CSP.
+The XML below is for Windows 10, version 1709.
``` syntax
@@ -30,12 +33,12 @@ The XML below is the current version for this CSP.
1.2
Office
- ./Vendor/MSFT
+ ./User/Vendor/MSFT
- Root of the office CSP.
+ Root of the Office CSP.
@@ -46,7 +49,7 @@ The XML below is the current version for this CSP.
- com.microsoft/1.0/MDM/Office
+ com.microsoft/1.3/MDM/Office
@@ -55,7 +58,7 @@ The XML below is the current version for this CSP.
- Installation options for the office CSP.
+ Installation options for the Office CSP.
@@ -100,7 +103,7 @@ The XML below is the current version for this CSP.
- The install action will install office given the configuration in the data. The string data is the xml configuration to use in order to install office.
+ The install action will install Office given the configuration in the data. The string data is the xml configuration to use in order to install Office.
@@ -137,6 +140,27 @@ The XML below is the current version for this CSP.
+
+ CurrentStatus
+
+
+
+
+ The current Office 365 installation status on the machine
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
@@ -156,7 +180,7 @@ The XML below is the current version for this CSP.
-
+ com.microsoft/1.3/MDM/Office
@@ -243,6 +267,27 @@ The XML below is the current version for this CSP.
+
+ CurrentStatus
+
+
+
+
+ The current Office 365 installation status on the machine
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md
index 7659b059e9..c6e4757c28 100644
--- a/windows/client-management/mdm/policy-configuration-service-provider.md
+++ b/windows/client-management/mdm/policy-configuration-service-provider.md
@@ -7,7 +7,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/27/2017
+ms.date: 08/25/2017
---
# Policy CSP
@@ -338,6 +338,30 @@ The following diagram shows the Policy configuration service provider in tree fo
-
Bitlocker/EncryptionMethod
+ -
+ BitLocker/EncryptionMethodByDriveType in BitLocker CSP
+
+ -
+ BitLocker/FixedDrivesRecoveryOptions in BitLocker CSP
+
+ -
+ BitLocker/FixedDrivesRequireEncryption in BitLocker CSP
+
+ -
+ BitLocker/RemovableDrivesRequireEncryption in BitLocker CSP
+
+ -
+ BitLocker/SystemDrivesMinimumPINLength in BitLocker CSP
+
+ -
+ BitLocker/SystemDrivesRecoveryMessage in BitLocker CSP
+
+ -
+ BitLocker/SystemDrivesRecoveryOptions in BitLocker CSP
+
+ -
+ BitLocker/SystemDrivesRequireStartupAuthentication in BitLocker CSP
+
### Bluetooth policies
@@ -432,6 +456,9 @@ The following diagram shows the Policy configuration service provider in tree fo
-
Browser/HomePages
+ -
+ Browser/LockdownFavorites
+
-
Browser/PreventAccessToAboutFlagsInMicrosoftEdge
@@ -450,6 +477,9 @@ The following diagram shows the Policy configuration service provider in tree fo
-
Browser/PreventUsingLocalHostIPAddressForWebRTC
+ -
+ Browser/ProvisionFavorites
+
-
Browser/SendIntranetTraffictoInternetExplorer
@@ -534,7 +564,7 @@ The following diagram shows the Policy configuration service provider in tree fo
CredentialProviders/BlockPicturePassword
-
- CredentialProviders/EnableWindowsAutoPilotResetCredentials
+ CredentialProviders/DisableAutomaticReDeploymentCredentials
@@ -643,7 +673,7 @@ The following diagram shows the Policy configuration service provider in tree fo
Defender/DaysToRetainCleanedMalware
-
- Defender/EnableGuardMyFolders
+ Defender/EnableControlledFolderAccess
-
Defender/EnableNetworkProtection
@@ -658,10 +688,10 @@ The following diagram shows the Policy configuration service provider in tree fo
Defender/ExcludedProcesses
-
- Defender/GuardedFoldersAllowedApplications
+ Defender/ControlledFolderAccessAllowedApplications
-
- Defender/GuardedFoldersList
+ Defender/ControlledFolderAccessProtectedFolders
-
Defender/PUAProtection
@@ -978,6 +1008,14 @@ The following diagram shows the Policy configuration service provider in tree fo
+### ExploitGuard policies
+
+
+ -
+ ExploitGuard/ExploitProtectionSettings
+
+
+
### Games policies
@@ -1778,6 +1816,83 @@ The following diagram shows the Policy configuration service provider in tree fo
+### LocalPoliciesSecurityOptions policies
+
+
+ -
+ LocalPoliciesSecurityOptions/Accounts_BlockMicrosoftAccounts
+
+ -
+ LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatus
+
+ -
+ LocalPoliciesSecurityOptions/Accounts_EnableGuestAccountStatus
+
+ -
+ LocalPoliciesSecurityOptions/Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly
+
+ -
+ LocalPoliciesSecurityOptions/Accounts_RenameAdministratorAccount
+
+ -
+ LocalPoliciesSecurityOptions/Accounts_RenameGuestAccount
+
+ -
+ LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked
+
+ -
+ LocalPoliciesSecurityOptions/InteractiveLogon_DoNotDisplayLastSignedIn
+
+ -
+ LocalPoliciesSecurityOptions/InteractiveLogon_DoNotDisplayUsernameAtSignIn
+
+ -
+ LocalPoliciesSecurityOptions/InteractiveLogon_DoNotRequireCTRLALTDEL
+
+ -
+ LocalPoliciesSecurityOptions/InteractiveLogon_MachineInactivityLimit
+
+ -
+ LocalPoliciesSecurityOptions/InteractiveLogon_MessageTextForUsersAttemptingToLogOn
+
+ -
+ LocalPoliciesSecurityOptions/InteractiveLogon_MessageTitleForUsersAttemptingToLogOn
+
+ -
+ LocalPoliciesSecurityOptions/NetworkSecurity_AllowPKU2UAuthenticationRequests
+
+ -
+ LocalPoliciesSecurityOptions/RecoveryConsole_AllowAutomaticAdministrativeLogon
+
+ -
+ LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn
+
+ -
+ LocalPoliciesSecurityOptions/UserAccountControl_RunAllAdministratorsInAdminApprovalMode
+
+ -
+ LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation
+
+ -
+ LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForAdministrators
+
+ -
+ LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers
+
+ -
+ LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateExecutableFilesThatAreSignedAndValidated
+
+ -
+ LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations
+
+ -
+ LocalPoliciesSecurityOptions/UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation
+
+ -
+ LocalPoliciesSecurityOptions/UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations
+
+
+
### Location policies
@@ -1914,6 +2029,9 @@ The following diagram shows the Policy configuration service provider in tree fo
-
Privacy/DisableAdvertisingId
+ -
+ Privacy/EnableActivityFeed
+
-
Privacy/LetAppsAccessAccountInfo
@@ -2130,6 +2248,9 @@ The following diagram shows the Policy configuration service provider in tree fo
-
Privacy/LetAppsSyncWithDevices_UserInControlOfTheseApps
+ -
+ Privacy/PublishUserActivities
+
### RemoteAssistance policies
@@ -2262,6 +2383,9 @@ The following diagram shows the Policy configuration service provider in tree fo
### Search policies
+-
+ Search/AllowCloudSearch
+
-
Search/AllowIndexingEncryptedStoresOrItems
@@ -2525,6 +2649,9 @@ The following diagram shows the Policy configuration service provider in tree fo
-
System/DisableSystemRestore
+ -
+ System/LimitEnhancedDiagnosticDataWindowsAnalytics
+
-
System/TelemetryProxy
@@ -2597,6 +2724,9 @@ The following diagram shows the Policy configuration service provider in tree fo
-
Update/AllowAutoUpdate
+ -
+ Update/AllowAutoWindowsUpdateDownloadOverMeteredNetwork
+
-
Update/AllowMUUpdateService
@@ -2633,6 +2763,9 @@ The following diagram shows the Policy configuration service provider in tree fo
-
Update/DetectionFrequency
+ -
+ Update/DisableDualScan
+
-
Update/EngagedRestartDeadline
@@ -3395,6 +3528,7 @@ The following diagram shows the Policy configuration service provider in tree fo
- [DeliveryOptimization/DOPercentageMaxDownloadBandwidth](#deliveryoptimization-dopercentagemaxdownloadbandwidth)
- [Desktop/PreventUserRedirectionOfProfileFolders](#desktop-preventuserredirectionofprofilefolders)
- [DeviceGuard/AllowKernelControlFlowGuard](#deviceguard-allowkernelcontrolflowguard)
+- [Privacy/EnableActivityFeed](#privacy-enableactivityfeed)
- [Privacy/LetAppsGetDiagnosticInfo](#privacy-letappsgetdiagnosticinfo)
- [Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps](#privacy-letappsgetdiagnosticinfo-forceallowtheseapps)
- [Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps](#privacy-letappsgetdiagnosticinfo-forcedenytheseapps)
@@ -3403,6 +3537,7 @@ The following diagram shows the Policy configuration service provider in tree fo
- [Privacy/LetAppsRunInBackground_ForceAllowTheseApps](#privacy-letappsruninbackground-forceallowtheseapps)
- [Privacy/LetAppsRunInBackground_ForceDenyTheseApps](#privacy-letappsruninbackground-forcedenytheseapps)
- [Privacy/LetAppsRunInBackground_UserInControlOfTheseApps](#privacy-letappsruninbackground-userincontroloftheseapps)
+- [Privacy/PublishUserActivities](#privacy-publishuseractivities)
- [Security/RequireProvisioningPackageSignature](#security-requireprovisioningpackagesignature)
- [Security/RequireRetrieveHealthCertificateOnBoot](#security-requireretrievehealthcertificateonboot)
- [System/AllowFontProviders](#system-allowfontproviders)
diff --git a/windows/client-management/mdm/policy-csp-abovelock.md b/windows/client-management/mdm/policy-csp-abovelock.md
index 5b1b04014f..2268695665 100644
--- a/windows/client-management/mdm/policy-csp-abovelock.md
+++ b/windows/client-management/mdm/policy-csp-abovelock.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - AboveLock
diff --git a/windows/client-management/mdm/policy-csp-accounts.md b/windows/client-management/mdm/policy-csp-accounts.md
index 321173c109..f2e678427b 100644
--- a/windows/client-management/mdm/policy-csp-accounts.md
+++ b/windows/client-management/mdm/policy-csp-accounts.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Accounts
diff --git a/windows/client-management/mdm/policy-csp-activexcontrols.md b/windows/client-management/mdm/policy-csp-activexcontrols.md
index ecf8c1bd88..755aeb5a2e 100644
--- a/windows/client-management/mdm/policy-csp-activexcontrols.md
+++ b/windows/client-management/mdm/policy-csp-activexcontrols.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - ActiveXControls
@@ -64,8 +64,9 @@ Note: Wild card characters cannot be used when specifying the host URLs.
ADMX Info:
-- GP english name: *Approved Installation Sites for ActiveX Controls*
+- GP English name: *Approved Installation Sites for ActiveX Controls*
- GP name: *ApprovedActiveXInstallSites*
+- GP path: *Windows Components/ActiveX Installer Service*
- GP ADMX file name: *ActiveXInstallService.admx*
diff --git a/windows/client-management/mdm/policy-csp-applicationdefaults.md b/windows/client-management/mdm/policy-csp-applicationdefaults.md
index 1611634651..838ad9fbc8 100644
--- a/windows/client-management/mdm/policy-csp-applicationdefaults.md
+++ b/windows/client-management/mdm/policy-csp-applicationdefaults.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - ApplicationDefaults
diff --git a/windows/client-management/mdm/policy-csp-applicationmanagement.md b/windows/client-management/mdm/policy-csp-applicationmanagement.md
index 04487cf2a4..db13ecc123 100644
--- a/windows/client-management/mdm/policy-csp-applicationmanagement.md
+++ b/windows/client-management/mdm/policy-csp-applicationmanagement.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - ApplicationManagement
diff --git a/windows/client-management/mdm/policy-csp-appvirtualization.md b/windows/client-management/mdm/policy-csp-appvirtualization.md
index b0b817880f..e44fda0b34 100644
--- a/windows/client-management/mdm/policy-csp-appvirtualization.md
+++ b/windows/client-management/mdm/policy-csp-appvirtualization.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - AppVirtualization
@@ -58,8 +58,9 @@ This policy setting allows you to enable or disable Microsoft Application Virtua
ADMX Info:
-- GP english name: *Enable App-V Client*
+- GP English name: *Enable App-V Client*
- GP name: *EnableAppV*
+- GP path: *System/App-V*
- GP ADMX file name: *appv.admx*
@@ -103,8 +104,9 @@ Enables Dynamic Virtualization of supported shell extensions, browser helper obj
ADMX Info:
-- GP english name: *Enable Dynamic Virtualization*
+- GP English name: *Enable Dynamic Virtualization*
- GP name: *Virtualization_JITVEnable*
+- GP path: *System/App-V/Virtualization*
- GP ADMX file name: *appv.admx*
@@ -148,8 +150,9 @@ Enables automatic cleanup of appv packages that were added after Windows10 anniv
ADMX Info:
-- GP english name: *Enable automatic cleanup of unused appv packages*
+- GP English name: *Enable automatic cleanup of unused appv packages*
- GP name: *PackageManagement_AutoCleanupEnable*
+- GP path: *System/App-V/PackageManagement*
- GP ADMX file name: *appv.admx*
@@ -193,8 +196,9 @@ Enables scripts defined in the package manifest of configuration files that shou
ADMX Info:
-- GP english name: *Enable Package Scripts*
+- GP English name: *Enable Package Scripts*
- GP name: *Scripting_Enable_Package_Scripts*
+- GP path: *System/App-V/Scripting*
- GP ADMX file name: *appv.admx*
@@ -238,8 +242,9 @@ Enables a UX to display to the user when a publishing refresh is performed on th
ADMX Info:
-- GP english name: *Enable Publishing Refresh UX*
+- GP English name: *Enable Publishing Refresh UX*
- GP name: *Enable_Publishing_Refresh_UX*
+- GP path: *System/App-V/Publishing*
- GP ADMX file name: *appv.admx*
@@ -293,8 +298,9 @@ Data Block Size: This value specifies the maximum size in bytes to transmit to t
ADMX Info:
-- GP english name: *Reporting Server*
+- GP English name: *Reporting Server*
- GP name: *Reporting_Server_Policy*
+- GP path: *System/App-V/Reporting*
- GP ADMX file name: *appv.admx*
@@ -338,8 +344,9 @@ Specifies the file paths relative to %userprofile% that do not roam with a user'
ADMX Info:
-- GP english name: *Roaming File Exclusions*
+- GP English name: *Roaming File Exclusions*
- GP name: *Integration_Roaming_File_Exclusions*
+- GP path: *System/App-V/Integration*
- GP ADMX file name: *appv.admx*
@@ -383,8 +390,9 @@ Specifies the registry paths that do not roam with a user profile. Example usage
ADMX Info:
-- GP english name: *Roaming Registry Exclusions*
+- GP English name: *Roaming Registry Exclusions*
- GP name: *Integration_Roaming_Registry_Exclusions*
+- GP path: *System/App-V/Integration*
- GP ADMX file name: *appv.admx*
@@ -428,8 +436,9 @@ Specifies how new packages should be loaded automatically by App-V on a specific
ADMX Info:
-- GP english name: *Specify what to load in background (aka AutoLoad)*
+- GP English name: *Specify what to load in background (aka AutoLoad)*
- GP name: *Steaming_Autoload*
+- GP path: *System/App-V/Streaming*
- GP ADMX file name: *appv.admx*
@@ -473,8 +482,9 @@ Migration mode allows the App-V client to modify shortcuts and FTA's for package
ADMX Info:
-- GP english name: *Enable Migration Mode*
+- GP English name: *Enable Migration Mode*
- GP name: *Client_Coexistence_Enable_Migration_mode*
+- GP path: *System/App-V/Client Coexistence*
- GP ADMX file name: *appv.admx*
@@ -518,8 +528,9 @@ Specifies the location where symbolic links are created to the current version o
ADMX Info:
-- GP english name: *Integration Root User*
+- GP English name: *Integration Root User*
- GP name: *Integration_Root_User*
+- GP path: *System/App-V/Integration*
- GP ADMX file name: *appv.admx*
@@ -563,8 +574,9 @@ Specifies the location where symbolic links are created to the current version o
ADMX Info:
-- GP english name: *Integration Root Global*
+- GP English name: *Integration Root Global*
- GP name: *Integration_Root_Global*
+- GP path: *System/App-V/Integration*
- GP ADMX file name: *appv.admx*
@@ -626,8 +638,9 @@ User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, D
ADMX Info:
-- GP english name: *Publishing Server 1 Settings*
+- GP English name: *Publishing Server 1 Settings*
- GP name: *Publishing_Server1_Policy*
+- GP path: *System/App-V/Publishing*
- GP ADMX file name: *appv.admx*
@@ -689,8 +702,9 @@ User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, D
ADMX Info:
-- GP english name: *Publishing Server 2 Settings*
+- GP English name: *Publishing Server 2 Settings*
- GP name: *Publishing_Server2_Policy*
+- GP path: *System/App-V/Publishing*
- GP ADMX file name: *appv.admx*
@@ -752,8 +766,9 @@ User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, D
ADMX Info:
-- GP english name: *Publishing Server 3 Settings*
+- GP English name: *Publishing Server 3 Settings*
- GP name: *Publishing_Server3_Policy*
+- GP path: *System/App-V/Publishing*
- GP ADMX file name: *appv.admx*
@@ -815,8 +830,9 @@ User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, D
ADMX Info:
-- GP english name: *Publishing Server 4 Settings*
+- GP English name: *Publishing Server 4 Settings*
- GP name: *Publishing_Server4_Policy*
+- GP path: *System/App-V/Publishing*
- GP ADMX file name: *appv.admx*
@@ -878,8 +894,9 @@ User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, D
ADMX Info:
-- GP english name: *Publishing Server 5 Settings*
+- GP English name: *Publishing Server 5 Settings*
- GP name: *Publishing_Server5_Policy*
+- GP path: *System/App-V/Publishing*
- GP ADMX file name: *appv.admx*
@@ -923,8 +940,9 @@ Specifies the path to a valid certificate in the certificate store.
ADMX Info:
-- GP english name: *Certificate Filter For Client SSL*
+- GP English name: *Certificate Filter For Client SSL*
- GP name: *Streaming_Certificate_Filter_For_Client_SSL*
+- GP path: *System/App-V/Streaming*
- GP ADMX file name: *appv.admx*
@@ -968,8 +986,9 @@ This setting controls whether virtualized applications are launched on Windows 8
ADMX Info:
-- GP english name: *Allow First Time Application Launches if on a High Cost Windows 8 Metered Connection*
+- GP English name: *Allow First Time Application Launches if on a High Cost Windows 8 Metered Connection*
- GP name: *Streaming_Allow_High_Cost_Launch*
+- GP path: *System/App-V/Streaming*
- GP ADMX file name: *appv.admx*
@@ -1013,8 +1032,9 @@ Specifies the CLSID for a compatible implementation of the IAppvPackageLocationP
ADMX Info:
-- GP english name: *Location Provider*
+- GP English name: *Location Provider*
- GP name: *Streaming_Location_Provider*
+- GP path: *System/App-V/Streaming*
- GP ADMX file name: *appv.admx*
@@ -1058,8 +1078,9 @@ Specifies directory where all new applications and updates will be installed.
ADMX Info:
-- GP english name: *Package Installation Root*
+- GP English name: *Package Installation Root*
- GP name: *Streaming_Package_Installation_Root*
+- GP path: *System/App-V/Streaming*
- GP ADMX file name: *appv.admx*
@@ -1103,8 +1124,9 @@ Overrides source location for downloading package content.
ADMX Info:
-- GP english name: *Package Source Root*
+- GP English name: *Package Source Root*
- GP name: *Streaming_Package_Source_Root*
+- GP path: *System/App-V/Streaming*
- GP ADMX file name: *appv.admx*
@@ -1148,8 +1170,9 @@ Specifies the number of seconds between attempts to reestablish a dropped sessio
ADMX Info:
-- GP english name: *Reestablishment Interval*
+- GP English name: *Reestablishment Interval*
- GP name: *Streaming_Reestablishment_Interval*
+- GP path: *System/App-V/Streaming*
- GP ADMX file name: *appv.admx*
@@ -1193,8 +1216,9 @@ Specifies the number of times to retry a dropped session.
ADMX Info:
-- GP english name: *Reestablishment Retries*
+- GP English name: *Reestablishment Retries*
- GP name: *Streaming_Reestablishment_Retries*
+- GP path: *System/App-V/Streaming*
- GP ADMX file name: *appv.admx*
@@ -1238,8 +1262,9 @@ Specifies that streamed package contents will be not be saved to the local hard
ADMX Info:
-- GP english name: *Shared Content Store (SCS) mode*
+- GP English name: *Shared Content Store (SCS) mode*
- GP name: *Streaming_Shared_Content_Store_Mode*
+- GP path: *System/App-V/Streaming*
- GP ADMX file name: *appv.admx*
@@ -1283,8 +1308,9 @@ If enabled, the App-V client will support BrancheCache compatible HTTP streaming
ADMX Info:
-- GP english name: *Enable Support for BranchCache*
+- GP English name: *Enable Support for BranchCache*
- GP name: *Streaming_Support_Branch_Cache*
+- GP path: *System/App-V/Streaming*
- GP ADMX file name: *appv.admx*
@@ -1328,8 +1354,9 @@ Verifies Server certificate revocation status before streaming using HTTPS.
ADMX Info:
-- GP english name: *Verify certificate revocation list*
+- GP English name: *Verify certificate revocation list*
- GP name: *Streaming_Verify_Certificate_Revocation_List*
+- GP path: *System/App-V/Streaming*
- GP ADMX file name: *appv.admx*
@@ -1373,8 +1400,9 @@ Specifies a list of process paths (may contain wildcards) which are candidates f
ADMX Info:
-- GP english name: *Virtual Component Process Allow List*
+- GP English name: *Virtual Component Process Allow List*
- GP name: *Virtualization_JITVAllowList*
+- GP path: *System/App-V/Virtualization*
- GP ADMX file name: *appv.admx*
diff --git a/windows/client-management/mdm/policy-csp-attachmentmanager.md b/windows/client-management/mdm/policy-csp-attachmentmanager.md
index 5d23ee3459..202f7f324a 100644
--- a/windows/client-management/mdm/policy-csp-attachmentmanager.md
+++ b/windows/client-management/mdm/policy-csp-attachmentmanager.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - AttachmentManager
@@ -64,8 +64,9 @@ If you do not configure this policy setting, Windows marks file attachments with
ADMX Info:
-- GP english name: *Do not preserve zone information in file attachments*
+- GP English name: *Do not preserve zone information in file attachments*
- GP name: *AM_MarkZoneOnSavedAtttachments*
+- GP path: *Windows Components/Attachment Manager*
- GP ADMX file name: *AttachmentManager.admx*
@@ -115,8 +116,9 @@ If you do not configure this policy setting, Windows hides the check box and Unb
ADMX Info:
-- GP english name: *Hide mechanisms to remove zone information*
+- GP English name: *Hide mechanisms to remove zone information*
- GP name: *AM_RemoveZoneInfo*
+- GP path: *Windows Components/Attachment Manager*
- GP ADMX file name: *AttachmentManager.admx*
@@ -166,8 +168,9 @@ If you do not configure this policy setting, Windows does not call the registere
ADMX Info:
-- GP english name: *Notify antivirus programs when opening attachments*
+- GP English name: *Notify antivirus programs when opening attachments*
- GP name: *AM_CallIOfficeAntiVirus*
+- GP path: *Windows Components/Attachment Manager*
- GP ADMX file name: *AttachmentManager.admx*
diff --git a/windows/client-management/mdm/policy-csp-authentication.md b/windows/client-management/mdm/policy-csp-authentication.md
index d6e687ff2b..fcc6506c15 100644
--- a/windows/client-management/mdm/policy-csp-authentication.md
+++ b/windows/client-management/mdm/policy-csp-authentication.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Authentication
diff --git a/windows/client-management/mdm/policy-csp-autoplay.md b/windows/client-management/mdm/policy-csp-autoplay.md
index 8d520d5bf1..daac26b55d 100644
--- a/windows/client-management/mdm/policy-csp-autoplay.md
+++ b/windows/client-management/mdm/policy-csp-autoplay.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Autoplay
@@ -62,8 +62,9 @@ If you disable or do not configure this policy setting, AutoPlay is enabled for
ADMX Info:
-- GP english name: *Disallow Autoplay for non-volume devices*
+- GP English name: *Disallow Autoplay for non-volume devices*
- GP name: *NoAutoplayfornonVolume*
+- GP path: *Windows Components/AutoPlay Policies*
- GP ADMX file name: *AutoPlay.admx*
@@ -120,8 +121,9 @@ If you disable or not configure this policy setting, Windows Vista or later will
ADMX Info:
-- GP english name: *Set the default behavior for AutoRun*
+- GP English name: *Set the default behavior for AutoRun*
- GP name: *NoAutorun*
+- GP path: *Windows Components/AutoPlay Policies*
- GP ADMX file name: *AutoPlay.admx*
@@ -179,8 +181,9 @@ Note: This policy setting appears in both the Computer Configuration and User Co
ADMX Info:
-- GP english name: *Turn off Autoplay*
+- GP English name: *Turn off Autoplay*
- GP name: *Autorun*
+- GP path: *Windows Components/AutoPlay Policies*
- GP ADMX file name: *AutoPlay.admx*
diff --git a/windows/client-management/mdm/policy-csp-bitlocker.md b/windows/client-management/mdm/policy-csp-bitlocker.md
index d400b459dc..1220f63607 100644
--- a/windows/client-management/mdm/policy-csp-bitlocker.md
+++ b/windows/client-management/mdm/policy-csp-bitlocker.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Bitlocker
@@ -58,6 +58,34 @@ ms.date: 07/14/2017
- 6 - XTS-AES 128-bit (Desktop only)
- 7 - XTS-AES 256-bit (Desktop only)
+You can find the following policies in BitLocker CSP:
+
+ -
+ BitLocker/EncryptionMethodByDriveType
+
+ -
+ BitLocker/FixedDrivesRecoveryOptions
+
+ -
+ BitLocker/FixedDrivesRequireEncryption
+
+ -
+ BitLocker/RemovableDrivesRequireEncryption
+
+ -
+ BitLocker/SystemDrivesMinimumPINLength
+
+ -
+ BitLocker/SystemDrivesRecoveryMessage
+
+ -
+ BitLocker/SystemDrivesRecoveryOptions
+
+ -
+ BitLocker/SystemDrivesRequireStartupAuthentication
+
+
+
diff --git a/windows/client-management/mdm/policy-csp-bluetooth.md b/windows/client-management/mdm/policy-csp-bluetooth.md
index 36f22b68f0..7bd2ea4992 100644
--- a/windows/client-management/mdm/policy-csp-bluetooth.md
+++ b/windows/client-management/mdm/policy-csp-bluetooth.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Bluetooth
diff --git a/windows/client-management/mdm/policy-csp-browser.md b/windows/client-management/mdm/policy-csp-browser.md
index 1f89d48fa9..82c992e8eb 100644
--- a/windows/client-management/mdm/policy-csp-browser.md
+++ b/windows/client-management/mdm/policy-csp-browser.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Browser
@@ -679,6 +679,16 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis
3. Click **Settings** in the drop down list, and select **View Advanced Settings**.
4. Verify the setting **Help protect me from malicious sites and download with SmartScreen Filter** is greyed out.
+
+
+
+**Browser/AlwaysEnableBooksLibrary**
+
+
+
+
+ This is only a placeholder.
+
@@ -965,6 +975,51 @@ Employees cannot remove these search engines, but they can set any one as the de
> [!NOTE]
> Turning this setting off, or not configuring it, sets your default Start pages to the webpages specified in App settings.
+
+
+
+**Browser/LockdownFavorites**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+
+
+
+
+
+Added in Windows 10, version 1709. This policy setting lets you decide whether employees can add, import, sort, or edit the Favorites list on Microsoft Edge.
+
+ If you enable this setting, employees won't be able to add, import, or change anything in the Favorites list. Also as part of this, Save a Favorite, Import settings, and the context menu items (such as, Create a new folder) are all turned off.
+
+> [!Important]
+> Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops employees from syncing their favorites between Internet Explorer and Microsoft Edge.
+
+
+- 0 - Disabled. Do not lockdown Favorites.
+- 1 - Enabled. Lockdown Favorites.
+
+
+If you disable or don't configure this setting (default), employees can add, import and make changes to the Favorites list.
+
+ Data type is integer.
+
@@ -1191,6 +1246,50 @@ Employees cannot remove these search engines, but they can set any one as the de
- 0 (default) – The localhost IP address is shown.
- 1 – The localhost IP address is hidden.
+
+
+
+**Browser/ProvisionFavorites**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+
+
+
+
+
+Added in Windows 10, version 1709. This policy setting allows you to configure a default set of favorites, which will appear for employees. Employees cannot modify, sort, move, export or delete these provisioned favorites. Specify the URL which points to the file that has all the data for provisioning favorites (in html format). You can export a set of favorites from Edge and use that html file for provisioning user machines.
+
+ URL can be specified as:
+
+- HTTP location: "SiteList"="http://localhost:8080/URLs.html"
+- Local network: "SiteList"="\\network\shares\URLs.html"
+- Local file: "SiteList"="file:///c:\\Users\\\\Documents\\URLs.html"
+
+> [!Important]
+> Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops employees from syncing their favorites between Internet Explorer and Microsoft Edge.
+
+If you disable or don't configure this setting, employees will see the favorites they set in the Hub and Favorites Bar.
+
+ Data type is string.
+
diff --git a/windows/client-management/mdm/policy-csp-camera.md b/windows/client-management/mdm/policy-csp-camera.md
index 827c761526..ca7b98ecc5 100644
--- a/windows/client-management/mdm/policy-csp-camera.md
+++ b/windows/client-management/mdm/policy-csp-camera.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Camera
diff --git a/windows/client-management/mdm/policy-csp-cellular.md b/windows/client-management/mdm/policy-csp-cellular.md
index 099237a30b..b1c206e118 100644
--- a/windows/client-management/mdm/policy-csp-cellular.md
+++ b/windows/client-management/mdm/policy-csp-cellular.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Cellular
@@ -56,8 +56,9 @@ ms.date: 07/14/2017
ADMX Info:
-- GP english name: *Set Per-App Cellular Access UI Visibility*
+- GP English name: *Set Per-App Cellular Access UI Visibility*
- GP name: *ShowAppCellularAccessUI*
+- GP path: *Network/WWAN Service/WWAN UI Settings*
- GP ADMX file name: *wwansvc.admx*
diff --git a/windows/client-management/mdm/policy-csp-connectivity.md b/windows/client-management/mdm/policy-csp-connectivity.md
index 4e608da6c7..5ffa503ab6 100644
--- a/windows/client-management/mdm/policy-csp-connectivity.md
+++ b/windows/client-management/mdm/policy-csp-connectivity.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Connectivity
@@ -386,8 +386,9 @@ ms.date: 07/14/2017
ADMX Info:
-- GP english name: *Turn off printing over HTTP*
+- GP English name: *Turn off printing over HTTP*
- GP name: *DisableHTTPPrinting_2*
+- GP path: *Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -429,8 +430,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Turn off downloading of print drivers over HTTP*
+- GP English name: *Turn off downloading of print drivers over HTTP*
- GP name: *DisableWebPnPDownload_2*
+- GP path: *Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -472,8 +474,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Turn off Internet download for Web publishing and online ordering wizards*
+- GP English name: *Turn off Internet download for Web publishing and online ordering wizards*
- GP name: *ShellPreventWPWDownload_2*
+- GP path: *Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -519,8 +522,9 @@ If you enable this policy, Windows only allows access to the specified UNC paths
ADMX Info:
-- GP english name: *Hardened UNC Paths*
+- GP English name: *Hardened UNC Paths*
- GP name: *Pol_HardenedPaths*
+- GP path: *Network/Network Provider*
- GP ADMX file name: *networkprovider.admx*
@@ -562,8 +566,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Prohibit installation and configuration of Network Bridge on your DNS domain network*
+- GP English name: *Prohibit installation and configuration of Network Bridge on your DNS domain network*
- GP name: *NC_AllowNetBridge_NLA*
+- GP path: *Network/Network Connections*
- GP ADMX file name: *NetworkConnections.admx*
diff --git a/windows/client-management/mdm/policy-csp-credentialproviders.md b/windows/client-management/mdm/policy-csp-credentialproviders.md
index 66d1f6d390..e253febdf8 100644
--- a/windows/client-management/mdm/policy-csp-credentialproviders.md
+++ b/windows/client-management/mdm/policy-csp-credentialproviders.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - CredentialProviders
@@ -66,8 +66,9 @@ To configure Windows Hello for Business, use the Administrative Template policie
ADMX Info:
-- GP english name: *Turn on convenience PIN sign-in*
+- GP English name: *Turn on convenience PIN sign-in*
- GP name: *AllowDomainPINLogon*
+- GP path: *System/Logon*
- GP ADMX file name: *credentialproviders.admx*
@@ -117,14 +118,15 @@ Note that the user's domain password will be cached in the system vault when usi
ADMX Info:
-- GP english name: *Turn off picture password sign-in*
+- GP English name: *Turn off picture password sign-in*
- GP name: *BlockDomainPicturePassword*
+- GP path: *System/Logon*
- GP ADMX file name: *credentialproviders.admx*
-**CredentialProviders/EnableWindowsAutoPilotResetCredentials**
+**CredentialProviders/DisableAutomaticReDeploymentCredentials**
@@ -150,11 +152,12 @@ ADMX Info:
-Added in Windows 10, version 1709. Boolean policy to enable the credential provider that triggers the PC refresh on a device. This policy does not actually trigger the refresh. When the policy is enabled, a WNF notification is generated that would schedule a task to update the visibility of the new provider. The admin user is required to authenticate to trigger the refresh on the target device.
+Added in Windows 10, version 1709. Boolean policy to disable the visibility of the credential provider that triggers the PC refresh on a device. This policy does not actually trigger the refresh. The admin user is required to authenticate to trigger the refresh on the target device.
-The auto pilot reset feature allows admin to reset devices to a known good managed state while preserving the management enrollment. After the auto pilot reset is triggered the devices are for ready for use by information workers or students.
+The Windows 10 Automatic ReDeployment feature allows admin to reset devices to a known good managed state while preserving the management enrollment. After the automatic redeployment is triggered the devices are for ready for use by information workers or students.
-Default value is 0.
+- 0 - Enable the visibility of the credentials for Windows 10 Automatic ReDeployment
+- 1 - Disable visibility of the credentials for Windows 10 Automatic ReDeployment
diff --git a/windows/client-management/mdm/policy-csp-credentialsui.md b/windows/client-management/mdm/policy-csp-credentialsui.md
index c99d68a5fe..15d68cf69e 100644
--- a/windows/client-management/mdm/policy-csp-credentialsui.md
+++ b/windows/client-management/mdm/policy-csp-credentialsui.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - CredentialsUI
@@ -66,8 +66,9 @@ The policy applies to all Windows components and applications that use the Windo
ADMX Info:
-- GP english name: *Do not display the password reveal button*
+- GP English name: *Do not display the password reveal button*
- GP name: *DisablePasswordReveal*
+- GP path: *Windows Components/Credential User Interface*
- GP ADMX file name: *credui.admx*
@@ -115,8 +116,9 @@ If you disable this policy setting, users will always be required to type a user
ADMX Info:
-- GP english name: *Enumerate administrator accounts on elevation*
+- GP English name: *Enumerate administrator accounts on elevation*
- GP name: *EnumerateAdministrators*
+- GP path: *Windows Components/Credential User Interface*
- GP ADMX file name: *credui.admx*
diff --git a/windows/client-management/mdm/policy-csp-cryptography.md b/windows/client-management/mdm/policy-csp-cryptography.md
index 28837af17c..eef7cdeba4 100644
--- a/windows/client-management/mdm/policy-csp-cryptography.md
+++ b/windows/client-management/mdm/policy-csp-cryptography.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Cryptography
diff --git a/windows/client-management/mdm/policy-csp-dataprotection.md b/windows/client-management/mdm/policy-csp-dataprotection.md
index e520e4612f..edba750722 100644
--- a/windows/client-management/mdm/policy-csp-dataprotection.md
+++ b/windows/client-management/mdm/policy-csp-dataprotection.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - DataProtection
diff --git a/windows/client-management/mdm/policy-csp-datausage.md b/windows/client-management/mdm/policy-csp-datausage.md
index decc54ee81..a8724cc2f6 100644
--- a/windows/client-management/mdm/policy-csp-datausage.md
+++ b/windows/client-management/mdm/policy-csp-datausage.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - DataUsage
@@ -68,8 +68,9 @@ If this policy setting is disabled or is not configured, the cost of 3G connecti
ADMX Info:
-- GP english name: *Set 3G Cost*
+- GP English name: *Set 3G Cost*
- GP name: *SetCost3G*
+- GP path: *Network/WWAN Service/WWAN Media Cost*
- GP ADMX file name: *wwansvc.admx*
@@ -123,8 +124,9 @@ If this policy setting is disabled or is not configured, the cost of 4G connecti
ADMX Info:
-- GP english name: *Set 4G Cost*
+- GP English name: *Set 4G Cost*
- GP name: *SetCost4G*
+- GP path: *Network/WWAN Service/WWAN Media Cost*
- GP ADMX file name: *wwansvc.admx*
diff --git a/windows/client-management/mdm/policy-csp-defender.md b/windows/client-management/mdm/policy-csp-defender.md
index 337cacc79f..3f35e2d4eb 100644
--- a/windows/client-management/mdm/policy-csp-defender.md
+++ b/windows/client-management/mdm/policy-csp-defender.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Defender
@@ -572,7 +572,7 @@ ms.date: 07/14/2017
Added in Windows 10, version 1709. This policy setting allows you to prevent Attack Surface reduction rules from matching on files under the paths specified or for the fully qualified resources specified. Paths should be added under the Options for this setting. Each entry must be listed as a name value pair, where the name should be a string representation of a path or a fully qualified resource name. As an example, a path might be defined as: "c:\Windows" to exclude all files in this directory. A fully qualified resource name might be defined as: "C:\Windows\App.exe"..
-Value type is string.
+ Value type is string.
@@ -609,7 +609,9 @@ Value type is string.
Added in Windows 10, version 1709. This policy setting enables setting the state (Block/Audit/Off) for each Attack surface reduction (ASR) rule. Each ASR rule listed can be set to one of the following states (Block/Audit/Off). The ASR rule ID and state should be added under the Options for this setting. Each entry must be listed as a name value pair. The name defines a valid ASR rule ID, while the value contains the status ID indicating the status of the rule.
-Value type is string.
+ For more information about ASR rule ID and status ID, see [Enable Attack Surface Reduction](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction).
+
+ Value type is string.
@@ -740,6 +742,74 @@ Value type is string.
> [!Note]
> This feature depends on three other MAPS settings the must all be enabled- "Configure the 'Block at First Sight' feature; "Join Microsoft MAPS"; "Send file samples when further analysis is required".
+
+
+
+**Defender/ControlledFolderAccessAllowedApplications**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+> [!NOTE]
+> This policy is only enforced in Windows 10 for desktop. The previous name was GuardedFoldersAllowedApplications and changed to ControlledFolderAccessAllowedApplications.
+
+Added in Windows 10, version 1709. This policy setting allows user-specified applications to the guard my folders feature. Adding an allowed application means the guard my folders feature will allow the application to modify or delete content in certain folders such as My Documents. In most cases it will not be necessary to add entries. Windows Defender Antivirus will automatically detect and dynamically add applications that are friendly. Value type is string. Use the Unicode as the substring separator.
+
+
+
+
+**Defender/ControlledFolderAccessProtectedFolders**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+> [!NOTE]
+> This policy is only enforced in Windows 10 for desktop. The previous name was GuardedFoldersList and changed to ControlledFolderAccessProtectedFolders.
+
+Added in Windows 10, version 1709. This policy settings allows adding user-specified folder locations to the guard my folders feature. These folders will complement the system defined folders such as My Documents and My Pictures. The list of system folders will be displayed in the user interface and can not be changed. Value type is string. Use the Unicode as the substring separator.
+
@@ -782,7 +852,7 @@ Value type is string.
-**Defender/EnableGuardMyFolders**
+**Defender/EnableControlledFolderAccess**
@@ -809,13 +879,13 @@ Value type is string.
> [!NOTE]
-> This policy is only enforced in Windows 10 for desktop.
+> This policy is only enforced in Windows 10 for desktop. The previous name was EnableGuardMyFolders and changed to EnableControlledFolderAccess.
Added in Windows 10, version 1709. This policy enables setting the state (On/Off/Audit) for the guard my folders feature. The guard my folders feature removes modify and delete permissions from untrusted applications to certain folders such as My Documents. Value type is integer and the range is 0 - 2.
-- 0 (default) - Off
-- 1 - Audit mode
-- 2 - Enforcement mode
+- 0 (default) - Disabled
+- 1 - Enabled
+- 2 - Audit Mode
@@ -974,74 +1044,6 @@ Value type is string.
Each file type must be separated by a **|**. For example, "C:\\Example.exe|C:\\Example1.exe".
-
-
-
-**Defender/GuardedFoldersAllowedApplications**
-
-
-
-
- Home |
- Pro |
- Business |
- Enterprise |
- Education |
- Mobile |
- Mobile Enterprise |
-
-
-  |
- 3 |
- 3 |
- 3 |
- 3 |
-  |
-  |
-
-
-
-
-
-> [!NOTE]
-> This policy is only enforced in Windows 10 for desktop.
-
-Added in Windows 10, version 1709. This policy setting allows user-specified applications to the guard my folders feature. Adding an allowed application means the guard my folders feature will allow the application to modify or delete content in certain folders such as My Documents. In most cases it will not be necessary to add entries. Windows Defender Antivirus will automatically detect and dynamically add applications that are friendly. Value type is string. Use the Unicode as the substring separator.
-
-
-
-
-**Defender/GuardedFoldersList**
-
-
-
-
- Home |
- Pro |
- Business |
- Enterprise |
- Education |
- Mobile |
- Mobile Enterprise |
-
-
-  |
- 3 |
- 3 |
- 3 |
- 3 |
-  |
-  |
-
-
-
-
-
-> [!NOTE]
-> This policy is only enforced in Windows 10 for desktop.
-
-Added in Windows 10, version 1709. This policy settings allows adding user-specified folder locations to the guard my folders feature. These folders will complement the system defined folders such as My Documents and My Pictures. The list of system folders will be displayed in the user interface and can not be changed. Value type is string. Use the Unicode as the substring separator.
-
diff --git a/windows/client-management/mdm/policy-csp-deliveryoptimization.md b/windows/client-management/mdm/policy-csp-deliveryoptimization.md
index 830147907b..e352718a5d 100644
--- a/windows/client-management/mdm/policy-csp-deliveryoptimization.md
+++ b/windows/client-management/mdm/policy-csp-deliveryoptimization.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - DeliveryOptimization
diff --git a/windows/client-management/mdm/policy-csp-desktop.md b/windows/client-management/mdm/policy-csp-desktop.md
index 2a09f78ddf..8a3b89d0f5 100644
--- a/windows/client-management/mdm/policy-csp-desktop.md
+++ b/windows/client-management/mdm/policy-csp-desktop.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Desktop
@@ -62,8 +62,9 @@ If you enable this setting, users are unable to type a new location in the Targe
ADMX Info:
-- GP english name: *Prohibit User from manually redirecting Profile Folders*
+- GP English name: *Prohibit User from manually redirecting Profile Folders*
- GP name: *DisablePersonalDirChange*
+- GP path: *Desktop*
- GP ADMX file name: *desktop.admx*
diff --git a/windows/client-management/mdm/policy-csp-deviceguard.md b/windows/client-management/mdm/policy-csp-deviceguard.md
index f104ff82b3..df77a218e7 100644
--- a/windows/client-management/mdm/policy-csp-deviceguard.md
+++ b/windows/client-management/mdm/policy-csp-deviceguard.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - DeviceGuard
diff --git a/windows/client-management/mdm/policy-csp-deviceinstallation.md b/windows/client-management/mdm/policy-csp-deviceinstallation.md
index 4f4b4d25d5..4b04c4567d 100644
--- a/windows/client-management/mdm/policy-csp-deviceinstallation.md
+++ b/windows/client-management/mdm/policy-csp-deviceinstallation.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - DeviceInstallation
@@ -62,8 +62,9 @@ If you disable or do not configure this policy setting, devices can be installed
ADMX Info:
-- GP english name: *Prevent installation of devices that match any of these device IDs*
+- GP English name: *Prevent installation of devices that match any of these device IDs*
- GP name: *DeviceInstall_IDs_Deny*
+- GP path: *System/Device Installation/Device Installation Restrictions*
- GP ADMX file name: *deviceinstallation.admx*
@@ -111,8 +112,9 @@ If you disable or do not configure this policy setting, Windows can install and
ADMX Info:
-- GP english name: *Prevent installation of devices using drivers that match these device setup classes*
+- GP English name: *Prevent installation of devices using drivers that match these device setup classes*
- GP name: *DeviceInstall_Classes_Deny*
+- GP path: *System/Device Installation/Device Installation Restrictions*
- GP ADMX file name: *deviceinstallation.admx*
diff --git a/windows/client-management/mdm/policy-csp-devicelock.md b/windows/client-management/mdm/policy-csp-devicelock.md
index 8ac0f11942..dcfc34f488 100644
--- a/windows/client-management/mdm/policy-csp-devicelock.md
+++ b/windows/client-management/mdm/policy-csp-devicelock.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - DeviceLock
@@ -767,8 +767,9 @@ If you enable this setting, users will no longer be able to modify slide show se
ADMX Info:
-- GP english name: *Prevent enabling lock screen slide show*
+- GP English name: *Prevent enabling lock screen slide show*
- GP name: *CPL_Personalization_NoLockScreenSlideshow*
+- GP path: *Control Panel/Personalization*
- GP ADMX file name: *ControlPanelDisplay.admx*
diff --git a/windows/client-management/mdm/policy-csp-display.md b/windows/client-management/mdm/policy-csp-display.md
index c10d926963..7af8189ba0 100644
--- a/windows/client-management/mdm/policy-csp-display.md
+++ b/windows/client-management/mdm/policy-csp-display.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Display
diff --git a/windows/client-management/mdm/policy-csp-education.md b/windows/client-management/mdm/policy-csp-education.md
index a1912d6edc..6be666c341 100644
--- a/windows/client-management/mdm/policy-csp-education.md
+++ b/windows/client-management/mdm/policy-csp-education.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/27/2017
+ms.date: 08/30/2017
---
# Policy CSP - Education
diff --git a/windows/client-management/mdm/policy-csp-enterprisecloudprint.md b/windows/client-management/mdm/policy-csp-enterprisecloudprint.md
index 7b33c7e5b4..c11c6d066d 100644
--- a/windows/client-management/mdm/policy-csp-enterprisecloudprint.md
+++ b/windows/client-management/mdm/policy-csp-enterprisecloudprint.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - EnterpriseCloudPrint
diff --git a/windows/client-management/mdm/policy-csp-errorreporting.md b/windows/client-management/mdm/policy-csp-errorreporting.md
index 800c8ac975..98c03c6579 100644
--- a/windows/client-management/mdm/policy-csp-errorreporting.md
+++ b/windows/client-management/mdm/policy-csp-errorreporting.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - ErrorReporting
@@ -72,8 +72,9 @@ If you disable or do not configure this policy setting, then the default consent
ADMX Info:
-- GP english name: *Customize consent settings*
+- GP English name: *Customize consent settings*
- GP name: *WerConsentCustomize_2*
+- GP path: *Windows Components/Windows Error Reporting/Consent*
- GP ADMX file name: *ErrorReporting.admx*
@@ -121,8 +122,9 @@ If you disable or do not configure this policy setting, the Turn off Windows Err
ADMX Info:
-- GP english name: *Disable Windows Error Reporting*
+- GP English name: *Disable Windows Error Reporting*
- GP name: *WerDisable_2*
+- GP path: *Windows Components/Windows Error Reporting*
- GP ADMX file name: *ErrorReporting.admx*
@@ -174,8 +176,9 @@ See also the Configure Error Reporting policy setting.
ADMX Info:
-- GP english name: *Display Error Notification*
+- GP English name: *Display Error Notification*
- GP name: *PCH_ShowUI*
+- GP path: *Windows Components/Windows Error Reporting*
- GP ADMX file name: *ErrorReporting.admx*
@@ -223,8 +226,9 @@ If you disable or do not configure this policy setting, then consent policy sett
ADMX Info:
-- GP english name: *Do not send additional data*
+- GP English name: *Do not send additional data*
- GP name: *WerNoSecondLevelData_2*
+- GP path: *Windows Components/Windows Error Reporting*
- GP ADMX file name: *ErrorReporting.admx*
@@ -272,8 +276,9 @@ If you disable or do not configure this policy setting, Windows Error Reporting
ADMX Info:
-- GP english name: *Prevent display of the user interface for critical errors*
+- GP English name: *Prevent display of the user interface for critical errors*
- GP name: *WerDoNotShowUI*
+- GP path: *Windows Components/Windows Error Reporting*
- GP ADMX file name: *ErrorReporting.admx*
diff --git a/windows/client-management/mdm/policy-csp-eventlogservice.md b/windows/client-management/mdm/policy-csp-eventlogservice.md
index a1f5c9527e..a73f5c2b18 100644
--- a/windows/client-management/mdm/policy-csp-eventlogservice.md
+++ b/windows/client-management/mdm/policy-csp-eventlogservice.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - EventLogService
@@ -64,8 +64,9 @@ Note: Old events may or may not be retained according to the "Backup log automat
ADMX Info:
-- GP english name: *Control Event Log behavior when the log file reaches its maximum size*
+- GP English name: *Control Event Log behavior when the log file reaches its maximum size*
- GP name: *Channel_Log_Retention_1*
+- GP path: *Windows Components/Event Log Service/Application*
- GP ADMX file name: *eventlog.admx*
@@ -113,8 +114,9 @@ If you disable or do not configure this policy setting, the maximum size of the
ADMX Info:
-- GP english name: *Specify the maximum log file size (KB)*
+- GP English name: *Specify the maximum log file size (KB)*
- GP name: *Channel_LogMaxSize_1*
+- GP path: *Windows Components/Event Log Service/Application*
- GP ADMX file name: *eventlog.admx*
@@ -162,8 +164,9 @@ If you disable or do not configure this policy setting, the maximum size of the
ADMX Info:
-- GP english name: *Specify the maximum log file size (KB)*
+- GP English name: *Specify the maximum log file size (KB)*
- GP name: *Channel_LogMaxSize_2*
+- GP path: *Windows Components/Event Log Service/Security*
- GP ADMX file name: *eventlog.admx*
@@ -211,8 +214,9 @@ If you disable or do not configure this policy setting, the maximum size of the
ADMX Info:
-- GP english name: *Specify the maximum log file size (KB)*
+- GP English name: *Specify the maximum log file size (KB)*
- GP name: *Channel_LogMaxSize_4*
+- GP path: *Windows Components/Event Log Service/System*
- GP ADMX file name: *eventlog.admx*
diff --git a/windows/client-management/mdm/policy-csp-experience.md b/windows/client-management/mdm/policy-csp-experience.md
index c69b113a36..b5e7a8bfe2 100644
--- a/windows/client-management/mdm/policy-csp-experience.md
+++ b/windows/client-management/mdm/policy-csp-experience.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Experience
diff --git a/windows/client-management/mdm/policy-csp-exploitguard.md b/windows/client-management/mdm/policy-csp-exploitguard.md
new file mode 100644
index 0000000000..292dfa31bc
--- /dev/null
+++ b/windows/client-management/mdm/policy-csp-exploitguard.md
@@ -0,0 +1,89 @@
+---
+title: Policy CSP - ExploitGuard
+description: Policy CSP - ExploitGuard
+ms.author: maricia
+ms.topic: article
+ms.prod: w10
+ms.technology: windows
+author: nickbrower
+ms.date: 08/30/2017
+---
+
+# Policy CSP - ExploitGuard
+
+> [!WARNING]
+> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
+
+
+
+
+## ExploitGuard policies
+
+
+**ExploitGuard/ExploitProtectionSettings**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+Enables the IT admin to push out a configuration representing the desired system and application mitigation options to all the devices in the organization. The configuration is represented by an XML. For more information Exploit Protection, see [Protect devices from exploits with Windows Defender Exploit Guard](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard) and [Import, export, and deploy Exploit Protection configurations](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml).
+
+ The system settings require a reboot; the application settings do not require a reboot.
+
+ Here is an example:
+
+``` syntax
+
+
+
+
+ $CmdId$
+ -
+
+ chr
+ text/plain
+
+
+ ./Vendor/MSFT/Policy/Config/ExploitGuard/ExploitProtectionSettings
+
+ ]]>
+
+
+
+
+
+
+```
+
+
+
+
+
+Footnote:
+
+- 1 - Added in Windows 10, version 1607.
+- 2 - Added in Windows 10, version 1703.
+- 3 - Added in Windows 10, version 1709.
+
+
+
diff --git a/windows/client-management/mdm/policy-csp-games.md b/windows/client-management/mdm/policy-csp-games.md
index 5cb47e7195..f6fc32cc9f 100644
--- a/windows/client-management/mdm/policy-csp-games.md
+++ b/windows/client-management/mdm/policy-csp-games.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/31/2017
---
# Policy CSP - Games
@@ -23,11 +23,35 @@ ms.date: 07/14/2017
**Games/AllowAdvancedGamingServices**
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
-Placeholder only. Currently not supported.
+ Added in Windows 10, version 1709. Specifies whether advanced gaming services can be used. These services may send data to Microsoft or publishers of games that use these services. Value type is integer.
+- 0 - Not Allowed
+- 1 (default) - Allowed
+
+ This policy can only be turned off in Windows 10 Education and Enterprise editions.
diff --git a/windows/client-management/mdm/policy-csp-internetexplorer.md b/windows/client-management/mdm/policy-csp-internetexplorer.md
index b5377f7a59..7be92bcfc1 100644
--- a/windows/client-management/mdm/policy-csp-internetexplorer.md
+++ b/windows/client-management/mdm/policy-csp-internetexplorer.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/16/2017
+ms.date: 08/30/2017
---
# Policy CSP - InternetExplorer
@@ -62,8 +62,9 @@ If you disable or do not configure this policy setting, the user can configure t
ADMX Info:
-- GP english name: *Add a specific list of search providers to the user's list of search providers*
+- GP English name: *Add a specific list of search providers to the user's list of search providers*
- GP name: *AddSearchProvider*
+- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -111,8 +112,9 @@ If you disable or do not configure this policy setting, ActiveX Filtering is not
ADMX Info:
-- GP english name: *Turn on ActiveX Filtering*
+- GP English name: *Turn on ActiveX Filtering*
- GP name: *TurnOnActiveXFiltering*
+- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -166,8 +168,9 @@ If you disable this policy setting, the list is deleted. The 'Deny all add-ons u
ADMX Info:
-- GP english name: *Add-on List*
+- GP English name: *Add-on List*
- GP name: *AddonManagement_AddOnList*
+- GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management*
- GP ADMX file name: *inetres.admx*
@@ -209,8 +212,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Turn on the auto-complete feature for user names and passwords on forms*
+- GP English name: *Turn on the auto-complete feature for user names and passwords on forms*
- GP name: *RestrictFormSuggestPW*
+- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -252,8 +256,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Turn on certificate address mismatch warning*
+- GP English name: *Turn on certificate address mismatch warning*
- GP name: *IZ_PolicyWarnCertMismatch*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -295,8 +300,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow deleting browsing history on exit*
+- GP English name: *Allow deleting browsing history on exit*
- GP name: *DBHDisableDeleteOnExit*
+- GP path: *Windows Components/Internet Explorer/Delete Browsing History*
- GP ADMX file name: *inetres.admx*
@@ -346,8 +352,9 @@ If you do not configure this policy, users will be able to turn on or turn off E
ADMX Info:
-- GP english name: *Turn on Enhanced Protected Mode*
+- GP English name: *Turn on Enhanced Protected Mode*
- GP name: *Advanced_EnableEnhancedProtectedMode*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page*
- GP ADMX file name: *inetres.admx*
@@ -395,8 +402,9 @@ If you disable or don't configure this policy setting, the menu option won't app
ADMX Info:
-- GP english name: *Let users turn on and use Enterprise Mode from the Tools menu*
+- GP English name: *Let users turn on and use Enterprise Mode from the Tools menu*
- GP name: *EnterpriseModeEnable*
+- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -444,8 +452,9 @@ If you disable or don't configure this policy setting, Internet Explorer opens a
ADMX Info:
-- GP english name: *Use the Enterprise Mode IE website list*
+- GP English name: *Use the Enterprise Mode IE website list*
- GP name: *EnterpriseModeSiteList*
+- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -487,8 +496,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow fallback to SSL 3.0 (Internet Explorer)*
+- GP English name: *Allow fallback to SSL 3.0 (Internet Explorer)*
- GP name: *Advanced_EnableSSL3Fallback*
+- GP path: *Windows Components/Internet Explorer/Security Features*
- GP ADMX file name: *inetres.admx*
@@ -536,8 +546,9 @@ If you disable or do not configure this policy setting, the user can add and rem
ADMX Info:
-- GP english name: *Use Policy List of Internet Explorer 7 sites*
+- GP English name: *Use Policy List of Internet Explorer 7 sites*
- GP name: *CompatView_UsePolicyList*
+- GP path: *Windows Components/Internet Explorer/Compatibility View*
- GP ADMX file name: *inetres.admx*
@@ -587,8 +598,9 @@ If you do not configure this policy setting, Internet Explorer uses an Internet
ADMX Info:
-- GP english name: *Turn on Internet Explorer Standards Mode for local intranet*
+- GP English name: *Turn on Internet Explorer Standards Mode for local intranet*
- GP name: *CompatView_IntranetSites*
+- GP path: *Windows Components/Internet Explorer/Compatibility View*
- GP ADMX file name: *inetres.admx*
@@ -642,8 +654,9 @@ Note. It is recommended to configure template policy settings in one Group Polic
ADMX Info:
-- GP english name: *Internet Zone Template*
+- GP English name: *Internet Zone Template*
- GP name: *IZ_PolicyInternetZoneTemplate*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -697,8 +710,9 @@ Note. It is recommended to configure template policy settings in one Group Polic
ADMX Info:
-- GP english name: *Intranet Zone Template*
+- GP English name: *Intranet Zone Template*
- GP name: *IZ_PolicyIntranetZoneTemplate*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -752,8 +766,9 @@ Note. It is recommended to configure template policy settings in one Group Polic
ADMX Info:
-- GP english name: *Local Machine Zone Template*
+- GP English name: *Local Machine Zone Template*
- GP name: *IZ_PolicyLocalMachineZoneTemplate*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -807,8 +822,9 @@ Note. It is recommended to configure template policy settings in one Group Polic
ADMX Info:
-- GP english name: *Locked-Down Internet Zone Template*
+- GP English name: *Locked-Down Internet Zone Template*
- GP name: *IZ_PolicyInternetZoneLockdownTemplate*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -862,8 +878,9 @@ Note. It is recommended to configure template policy settings in one Group Polic
ADMX Info:
-- GP english name: *Locked-Down Intranet Zone Template*
+- GP English name: *Locked-Down Intranet Zone Template*
- GP name: *IZ_PolicyIntranetZoneLockdownTemplate*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -917,8 +934,9 @@ Note. It is recommended to configure template policy settings in one Group Polic
ADMX Info:
-- GP english name: *Locked-Down Local Machine Zone Template*
+- GP English name: *Locked-Down Local Machine Zone Template*
- GP name: *IZ_PolicyLocalMachineZoneLockdownTemplate*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -972,8 +990,9 @@ Note. It is recommended to configure template policy settings in one Group Polic
ADMX Info:
-- GP english name: *Locked-Down Restricted Sites Zone Template*
+- GP English name: *Locked-Down Restricted Sites Zone Template*
- GP name: *IZ_PolicyRestrictedSitesZoneLockdownTemplate*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -1021,8 +1040,9 @@ If you disable or do not configure this policy setting, Internet Explorer does n
ADMX Info:
-- GP english name: *Go to an intranet site for a one-word entry in the Address bar*
+- GP English name: *Go to an intranet site for a one-word entry in the Address bar*
- GP name: *UseIntranetSiteForOneWordEntry*
+- GP path: *Windows Components/Internet Explorer/Internet Settings/Advanced settings/Browsing*
- GP ADMX file name: *inetres.admx*
@@ -1076,8 +1096,9 @@ If you disable or do not configure this policy, users may choose their own site-
ADMX Info:
-- GP english name: *Site to Zone Assignment List*
+- GP English name: *Site to Zone Assignment List*
- GP name: *IZ_Zonemaps*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -1119,8 +1140,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow software to run or install even if the signature is invalid*
+- GP English name: *Allow software to run or install even if the signature is invalid*
- GP name: *Advanced_InvalidSignatureBlock*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page*
- GP ADMX file name: *inetres.admx*
@@ -1170,8 +1192,9 @@ If you do not configure this policy setting, the user can turn on and turn off t
ADMX Info:
-- GP english name: *Turn on Suggested Sites*
+- GP English name: *Turn on Suggested Sites*
- GP name: *EnableSuggestedSites*
+- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -1225,8 +1248,9 @@ Note. It is recommended to configure template policy settings in one Group Polic
ADMX Info:
-- GP english name: *Trusted Sites Zone Template*
+- GP English name: *Trusted Sites Zone Template*
- GP name: *IZ_PolicyTrustedSitesZoneTemplate*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -1280,8 +1304,9 @@ Note. It is recommended to configure template policy settings in one Group Polic
ADMX Info:
-- GP english name: *Locked-Down Trusted Sites Zone Template*
+- GP English name: *Locked-Down Trusted Sites Zone Template*
- GP name: *IZ_PolicyTrustedSitesZoneLockdownTemplate*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -1335,8 +1360,9 @@ Note. It is recommended to configure template policy settings in one Group Polic
ADMX Info:
-- GP english name: *Restricted Sites Zone Template*
+- GP English name: *Restricted Sites Zone Template*
- GP name: *IZ_PolicyRestrictedSitesZoneTemplate*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -1378,8 +1404,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Check for server certificate revocation*
+- GP English name: *Check for server certificate revocation*
- GP name: *Advanced_CertificateRevocation*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page*
- GP ADMX file name: *inetres.admx*
@@ -1421,8 +1448,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Check for signatures on downloaded programs*
+- GP English name: *Check for signatures on downloaded programs*
- GP name: *Advanced_DownloadSignatures*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page*
- GP ADMX file name: *inetres.admx*
@@ -1464,8 +1492,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Internet Explorer Processes*
+- GP English name: *Internet Explorer Processes*
- GP name: *IESF_PolicyExplorerProcesses_2*
+- GP path: *Windows Components/Internet Explorer/Security Features/Binary Behavior Security Restriction*
- GP ADMX file name: *inetres.admx*
@@ -1515,8 +1544,9 @@ Note that Adobe Flash can still be disabled through the "Add-on List" and "Deny
ADMX Info:
-- GP english name: *Turn off Adobe Flash in Internet Explorer and prevent applications from using Internet Explorer technology to instantiate Flash objects*
+- GP English name: *Turn off Adobe Flash in Internet Explorer and prevent applications from using Internet Explorer technology to instantiate Flash objects*
- GP name: *DisableFlashInIE*
+- GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management*
- GP ADMX file name: *inetres.admx*
@@ -1558,8 +1588,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Turn off blocking of outdated ActiveX controls for Internet Explorer*
+- GP English name: *Turn off blocking of outdated ActiveX controls for Internet Explorer*
- GP name: *VerMgmtDisable*
+- GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management*
- GP ADMX file name: *inetres.admx*
@@ -1607,8 +1638,9 @@ If you disable or do not configure this policy setting, the user can bypass Smar
ADMX Info:
-- GP english name: *Prevent bypassing SmartScreen Filter warnings*
+- GP English name: *Prevent bypassing SmartScreen Filter warnings*
- GP name: *DisableSafetyFilterOverride*
+- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -1656,8 +1688,9 @@ If you disable or do not configure this policy setting, the user can bypass Smar
ADMX Info:
-- GP english name: *Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the Internet*
+- GP English name: *Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the Internet*
- GP name: *DisableSafetyFilterOverrideForAppRepUnknown*
+- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -1699,8 +1732,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Disable "Configuring History"*
+- GP English name: *Disable "Configuring History"*
- GP name: *RestrictHistory*
+- GP path: *Windows Components/Internet Explorer/Delete Browsing History*
- GP ADMX file name: *inetres.admx*
@@ -1742,8 +1776,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Turn off Crash Detection*
+- GP English name: *Turn off Crash Detection*
- GP name: *AddonManagement_RestrictCrashDetection*
+- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -1793,8 +1828,9 @@ If you do not configure this policy setting, the user can choose to participate
ADMX Info:
-- GP english name: *Prevent participation in the Customer Experience Improvement Program*
+- GP English name: *Prevent participation in the Customer Experience Improvement Program*
- GP name: *SQM_DisableCEIP*
+- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -1836,8 +1872,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Prevent deleting websites that the user has visited*
+- GP English name: *Prevent deleting websites that the user has visited*
- GP name: *DBHDisableDeleteHistory*
+- GP path: *Windows Components/Internet Explorer/Delete Browsing History*
- GP ADMX file name: *inetres.admx*
@@ -1885,8 +1922,9 @@ If you disable or do not configure this policy setting, the user can set the Fee
ADMX Info:
-- GP english name: *Prevent downloading of enclosures*
+- GP English name: *Prevent downloading of enclosures*
- GP name: *Disable_Downloading_of_Enclosures*
+- GP path: *Windows Components/RSS Feeds*
- GP ADMX file name: *inetres.admx*
@@ -1936,8 +1974,9 @@ Note: SSL 2.0 is off by default and is no longer supported starting with Windows
ADMX Info:
-- GP english name: *Turn off encryption support*
+- GP English name: *Turn off encryption support*
- GP name: *Advanced_SetWinInetProtocols*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page*
- GP ADMX file name: *inetres.admx*
@@ -1989,8 +2028,9 @@ If you disable or do not configure this policy setting, Internet Explorer may ru
ADMX Info:
-- GP english name: *Prevent running First Run wizard*
+- GP English name: *Prevent running First Run wizard*
- GP name: *NoFirstRunCustomise*
+- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -2042,8 +2082,9 @@ If you don't configure this setting, users can turn this behavior on or off, usi
ADMX Info:
-- GP english name: *Turn off the flip ahead with page prediction feature*
+- GP English name: *Turn off the flip ahead with page prediction feature*
- GP name: *Advanced_DisableFlipAhead*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page*
- GP ADMX file name: *inetres.admx*
@@ -2091,8 +2132,9 @@ If you disable or do not configure this policy setting, the Home page box is ena
ADMX Info:
-- GP english name: *Disable changing home page settings*
+- GP English name: *Disable changing home page settings*
- GP name: *RestrictHomePage*
+- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -2134,8 +2176,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Prevent ignoring certificate errors*
+- GP English name: *Prevent ignoring certificate errors*
- GP name: *NoCertError*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel*
- GP ADMX file name: *inetres.admx*
@@ -2177,8 +2220,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Turn off InPrivate Browsing*
+- GP English name: *Turn off InPrivate Browsing*
- GP name: *DisableInPrivateBrowsing*
+- GP path: *Windows Components/Internet Explorer/Privacy*
- GP ADMX file name: *inetres.admx*
@@ -2220,8 +2264,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Turn on 64-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows*
+- GP English name: *Turn on 64-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows*
- GP name: *Advanced_EnableEnhancedProtectedMode64Bit*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page*
- GP ADMX file name: *inetres.admx*
@@ -2269,8 +2314,9 @@ If you disable or do not configure this policy setting, the user can configure p
ADMX Info:
-- GP english name: *Prevent changing proxy settings*
+- GP English name: *Prevent changing proxy settings*
- GP name: *RestrictProxy*
+- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -2318,8 +2364,9 @@ If you disable or do not configure this policy setting, the user can change the
ADMX Info:
-- GP english name: *Prevent changing the default search provider*
+- GP English name: *Prevent changing the default search provider*
- GP name: *NoSearchProvider*
+- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -2369,8 +2416,9 @@ Note: If the Disable Changing Home Page Settings policy is enabled, the user can
ADMX Info:
-- GP english name: *Disable changing secondary home page settings*
+- GP English name: *Disable changing secondary home page settings*
- GP name: *SecondaryHomePages*
+- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -2412,8 +2460,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Turn off the Security Settings Check feature*
+- GP English name: *Turn off the Security Settings Check feature*
- GP name: *Disable_Security_Settings_Check*
+- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -2463,8 +2512,9 @@ This policy is intended to help the administrator maintain version control for I
ADMX Info:
-- GP english name: *Disable Periodic Check for Internet Explorer software updates*
+- GP English name: *Disable Periodic Check for Internet Explorer software updates*
- GP name: *NoUpdateCheck*
+- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -2506,8 +2556,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Do not allow ActiveX controls to run in Protected Mode when Enhanced Protected Mode is enabled*
+- GP English name: *Do not allow ActiveX controls to run in Protected Mode when Enhanced Protected Mode is enabled*
- GP name: *Advanced_DisableEPMCompat*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page*
- GP ADMX file name: *inetres.admx*
@@ -2561,8 +2612,9 @@ Also, see the "Security zones: Use only machine settings" policy.
ADMX Info:
-- GP english name: *Security Zones: Do not allow users to add/delete sites*
+- GP English name: *Security Zones: Do not allow users to add/delete sites*
- GP name: *Security_zones_map_edit*
+- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -2616,8 +2668,9 @@ Also, see the "Security zones: Use only machine settings" policy.
ADMX Info:
-- GP english name: *Security Zones: Do not allow users to change policies*
+- GP English name: *Security Zones: Do not allow users to change policies*
- GP name: *Security_options_edit*
+- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -2667,8 +2720,9 @@ For more information, see "Outdated ActiveX Controls" in the Internet Explorer T
ADMX Info:
-- GP english name: *Turn off blocking of outdated ActiveX controls for Internet Explorer*
+- GP English name: *Turn off blocking of outdated ActiveX controls for Internet Explorer*
- GP name: *VerMgmtDisable*
+- GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management*
- GP ADMX file name: *inetres.admx*
@@ -2722,8 +2776,9 @@ For more information, see "Outdated ActiveX Controls" in the Internet Explorer T
ADMX Info:
-- GP english name: *Turn off blocking of outdated ActiveX controls for Internet Explorer on specific domains*
+- GP English name: *Turn off blocking of outdated ActiveX controls for Internet Explorer on specific domains*
- GP name: *VerMgmtDomainAllowlist*
+- GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management*
- GP ADMX file name: *inetres.admx*
@@ -2773,8 +2828,9 @@ If you do not configure this policy setting, users choose whether to force local
ADMX Info:
-- GP english name: *Intranet Sites: Include all local (intranet) sites not listed in other zones*
+- GP English name: *Intranet Sites: Include all local (intranet) sites not listed in other zones*
- GP name: *IZ_IncludeUnspecifiedLocalSites*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -2824,8 +2880,9 @@ If you do not configure this policy setting, users choose whether network paths
ADMX Info:
-- GP english name: *Intranet Sites: Include all network paths (UNCs)*
+- GP English name: *Intranet Sites: Include all network paths (UNCs)*
- GP name: *IZ_UNCAsIntranet*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -2875,8 +2932,9 @@ If you do not configure this policy setting, users cannot load a page in the zon
ADMX Info:
-- GP english name: *Access data sources across domains*
+- GP English name: *Access data sources across domains*
- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -2926,8 +2984,9 @@ If you do not configure this policy setting, ActiveX control installations will
ADMX Info:
-- GP english name: *Automatic prompting for ActiveX controls*
+- GP English name: *Automatic prompting for ActiveX controls*
- GP name: *IZ_PolicyNotificationBarActiveXURLaction_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -2975,8 +3034,9 @@ If you disable or do not configure this setting, file downloads that are not use
ADMX Info:
-- GP english name: *Automatic prompting for file downloads*
+- GP English name: *Automatic prompting for file downloads*
- GP name: *IZ_PolicyNotificationBarDownloadURLaction_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -3018,8 +3078,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow cut, copy or paste operations from the clipboard via script*
+- GP English name: *Allow cut, copy or paste operations from the clipboard via script*
- GP name: *IZ_PolicyAllowPasteViaScript_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -3061,8 +3122,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow drag and drop or copy and paste files*
+- GP English name: *Allow drag and drop or copy and paste files*
- GP name: *IZ_PolicyDropOrPasteFiles_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -3112,8 +3174,9 @@ If you do not configure this policy setting, HTML fonts can be downloaded automa
ADMX Info:
-- GP english name: *Allow font downloads*
+- GP English name: *Allow font downloads*
- GP name: *IZ_PolicyFontDownload_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -3163,8 +3226,9 @@ If you do not configure this policy setting, Web sites from less privileged zone
ADMX Info:
-- GP english name: *Web sites in less privileged Web content zones can navigate into this zone*
+- GP English name: *Web sites in less privileged Web content zones can navigate into this zone*
- GP name: *IZ_PolicyZoneElevationURLaction_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -3206,8 +3270,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow loading of XAML files*
+- GP English name: *Allow loading of XAML files*
- GP name: *IZ_Policy_XAML_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -3257,8 +3322,9 @@ If you do not configure this policy setting, Internet Explorer will execute unsi
ADMX Info:
-- GP english name: *Run .NET Framework-reliant components not signed with Authenticode*
+- GP English name: *Run .NET Framework-reliant components not signed with Authenticode*
- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -3300,8 +3366,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow only approved domains to use ActiveX controls without prompt*
+- GP English name: *Allow only approved domains to use ActiveX controls without prompt*
- GP name: *IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Internet*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -3343,8 +3410,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow only approved domains to use the TDC ActiveX control*
+- GP English name: *Allow only approved domains to use the TDC ActiveX control*
- GP name: *IZ_PolicyAllowTDCControl_Both_Internet*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -3386,8 +3454,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow script-initiated windows without size or position constraints*
+- GP English name: *Allow script-initiated windows without size or position constraints*
- GP name: *IZ_PolicyWindowsRestrictionsURLaction_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -3429,8 +3498,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow scripting of Internet Explorer WebBrowser controls*
+- GP English name: *Allow scripting of Internet Explorer WebBrowser controls*
- GP name: *IZ_Policy_WebBrowserControl_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -3480,8 +3550,9 @@ If you do not configure this policy setting, the user can enable or disable scri
ADMX Info:
-- GP english name: *Allow scriptlets*
+- GP English name: *Allow scriptlets*
- GP name: *IZ_Policy_AllowScriptlets_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -3533,8 +3604,9 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt
ADMX Info:
-- GP english name: *Turn on SmartScreen Filter scan*
+- GP English name: *Turn on SmartScreen Filter scan*
- GP name: *IZ_Policy_Phishing_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -3576,8 +3648,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow updates to status bar via script*
+- GP English name: *Allow updates to status bar via script*
- GP name: *IZ_Policy_ScriptStatusBar_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -3627,8 +3700,9 @@ If you do not configure this policy setting, users can preserve information in t
ADMX Info:
-- GP english name: *Userdata persistence*
+- GP English name: *Userdata persistence*
- GP name: *IZ_PolicyUserdataPersistence_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -3670,8 +3744,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Don't run antimalware programs against ActiveX controls*
+- GP English name: *Don't run antimalware programs against ActiveX controls*
- GP name: *IZ_PolicyAntiMalwareCheckingOfActiveXControls_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -3713,8 +3788,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Download signed ActiveX controls*
+- GP English name: *Download signed ActiveX controls*
- GP name: *IZ_PolicyDownloadSignedActiveX_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -3756,8 +3832,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Download unsigned ActiveX controls*
+- GP English name: *Download unsigned ActiveX controls*
- GP name: *IZ_PolicyDownloadUnsignedActiveX_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -3799,8 +3876,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Turn on Cross-Site Scripting Filter*
+- GP English name: *Turn on Cross-Site Scripting Filter*
- GP name: *IZ_PolicyTurnOnXSSFilter_Both_Internet*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -3842,8 +3920,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Enable dragging of content from different domains across windows*
+- GP English name: *Enable dragging of content from different domains across windows*
- GP name: *IZ_PolicyDragDropAcrossDomainsAcrossWindows_Both_Internet*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -3885,8 +3964,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Enable dragging of content from different domains within a window*
+- GP English name: *Enable dragging of content from different domains within a window*
- GP name: *IZ_PolicyDragDropAcrossDomainsWithinWindow_Both_Internet*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -3928,8 +4008,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Enable MIME Sniffing*
+- GP English name: *Enable MIME Sniffing*
- GP name: *IZ_PolicyMimeSniffingURLaction_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -3971,8 +4052,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Turn on Protected Mode*
+- GP English name: *Turn on Protected Mode*
- GP name: *IZ_Policy_TurnOnProtectedMode_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -4014,8 +4096,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Include local path when user is uploading files to a server*
+- GP English name: *Include local path when user is uploading files to a server*
- GP name: *IZ_Policy_LocalPathForUpload_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -4067,8 +4150,9 @@ If you do not configure this policy setting, ActiveX controls that cannot be mad
ADMX Info:
-- GP english name: *Initialize and script ActiveX controls not marked as safe*
+- GP English name: *Initialize and script ActiveX controls not marked as safe*
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -4139,8 +4223,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Java permissions*
+- GP English name: *Java permissions*
- GP name: *IZ_PolicyJavaPermissions_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -4182,8 +4267,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Launching applications and files in an IFRAME*
+- GP English name: *Launching applications and files in an IFRAME*
- GP name: *IZ_PolicyLaunchAppsAndFilesInIFRAME_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -4225,8 +4311,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Logon options*
+- GP English name: *Logon options*
- GP name: *IZ_PolicyLogon_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -4276,8 +4363,9 @@ If you do not configure this policy setting, users can open windows and frames f
ADMX Info:
-- GP english name: *Navigate windows and frames across different domains*
+- GP English name: *Navigate windows and frames across different domains*
- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -4319,8 +4407,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Run .NET Framework-reliant components not signed with Authenticode*
+- GP English name: *Run .NET Framework-reliant components not signed with Authenticode*
- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -4362,8 +4451,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Run .NET Framework-reliant components signed with Authenticode*
+- GP English name: *Run .NET Framework-reliant components signed with Authenticode*
- GP name: *IZ_PolicySignedFrameworkComponentsURLaction_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -4405,8 +4495,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Show security warning for potentially unsafe files*
+- GP English name: *Show security warning for potentially unsafe files*
- GP name: *IZ_Policy_UnsafeFiles_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -4448,8 +4539,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Use Pop-up Blocker*
+- GP English name: *Use Pop-up Blocker*
- GP name: *IZ_PolicyBlockPopupWindows_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -4491,8 +4583,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Web sites in less privileged Web content zones can navigate into this zone*
+- GP English name: *Web sites in less privileged Web content zones can navigate into this zone*
- GP name: *IZ_PolicyZoneElevationURLaction_1*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -4542,8 +4635,9 @@ If you do not configure this policy setting, users are queried to choose whether
ADMX Info:
-- GP english name: *Access data sources across domains*
+- GP English name: *Access data sources across domains*
- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_3*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -4593,8 +4687,9 @@ If you do not configure this policy setting, users will receive a prompt when a
ADMX Info:
-- GP english name: *Automatic prompting for ActiveX controls*
+- GP English name: *Automatic prompting for ActiveX controls*
- GP name: *IZ_PolicyNotificationBarActiveXURLaction_3*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -4642,8 +4737,9 @@ If you disable or do not configure this setting, users will receive a file downl
ADMX Info:
-- GP english name: *Automatic prompting for file downloads*
+- GP English name: *Automatic prompting for file downloads*
- GP name: *IZ_PolicyNotificationBarDownloadURLaction_3*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -4693,8 +4789,9 @@ If you do not configure this policy setting, HTML fonts can be downloaded automa
ADMX Info:
-- GP english name: *Allow font downloads*
+- GP English name: *Allow font downloads*
- GP name: *IZ_PolicyFontDownload_3*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -4744,8 +4841,9 @@ If you do not configure this policy setting, Web sites from less privileged zone
ADMX Info:
-- GP english name: *Web sites in less privileged Web content zones can navigate into this zone*
+- GP English name: *Web sites in less privileged Web content zones can navigate into this zone*
- GP name: *IZ_PolicyZoneElevationURLaction_3*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -4795,8 +4893,9 @@ If you do not configure this policy setting, Internet Explorer will execute unsi
ADMX Info:
-- GP english name: *Run .NET Framework-reliant components not signed with Authenticode*
+- GP English name: *Run .NET Framework-reliant components not signed with Authenticode*
- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_3*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -4846,8 +4945,9 @@ If you do not configure this policy setting, the user can enable or disable scri
ADMX Info:
-- GP english name: *Allow scriptlets*
+- GP English name: *Allow scriptlets*
- GP name: *IZ_Policy_AllowScriptlets_3*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -4899,8 +4999,9 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt
ADMX Info:
-- GP english name: *Turn on SmartScreen Filter scan*
+- GP English name: *Turn on SmartScreen Filter scan*
- GP name: *IZ_Policy_Phishing_3*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -4950,8 +5051,9 @@ If you do not configure this policy setting, users can preserve information in t
ADMX Info:
-- GP english name: *Userdata persistence*
+- GP English name: *Userdata persistence*
- GP name: *IZ_PolicyUserdataPersistence_3*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -4993,8 +5095,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Don't run antimalware programs against ActiveX controls*
+- GP English name: *Don't run antimalware programs against ActiveX controls*
- GP name: *IZ_PolicyAntiMalwareCheckingOfActiveXControls_3*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -5046,8 +5149,9 @@ If you do not configure this policy setting, ActiveX controls that cannot be mad
ADMX Info:
-- GP english name: *Initialize and script ActiveX controls not marked as safe*
+- GP English name: *Initialize and script ActiveX controls not marked as safe*
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_3*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -5089,8 +5193,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Initialize and script ActiveX controls not marked as safe*
+- GP English name: *Initialize and script ActiveX controls not marked as safe*
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_3*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -5132,8 +5237,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Java permissions*
+- GP English name: *Java permissions*
- GP name: *IZ_PolicyJavaPermissions_3*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -5183,8 +5289,9 @@ If you do not configure this policy setting, users can open windows and frames f
ADMX Info:
-- GP english name: *Navigate windows and frames across different domains*
+- GP English name: *Navigate windows and frames across different domains*
- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_3*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -5234,8 +5341,9 @@ If you do not configure this policy setting, users can load a page in the zone t
ADMX Info:
-- GP english name: *Access data sources across domains*
+- GP English name: *Access data sources across domains*
- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_9*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -5285,8 +5393,9 @@ If you do not configure this policy setting, users will receive a prompt when a
ADMX Info:
-- GP english name: *Automatic prompting for ActiveX controls*
+- GP English name: *Automatic prompting for ActiveX controls*
- GP name: *IZ_PolicyNotificationBarActiveXURLaction_9*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -5334,8 +5443,9 @@ If you disable or do not configure this setting, users will receive a file downl
ADMX Info:
-- GP english name: *Automatic prompting for file downloads*
+- GP English name: *Automatic prompting for file downloads*
- GP name: *IZ_PolicyNotificationBarDownloadURLaction_9*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -5385,8 +5495,9 @@ If you do not configure this policy setting, HTML fonts can be downloaded automa
ADMX Info:
-- GP english name: *Allow font downloads*
+- GP English name: *Allow font downloads*
- GP name: *IZ_PolicyFontDownload_9*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -5436,8 +5547,9 @@ If you do not configure this policy setting, the possibly harmful navigations ar
ADMX Info:
-- GP english name: *Web sites in less privileged Web content zones can navigate into this zone*
+- GP English name: *Web sites in less privileged Web content zones can navigate into this zone*
- GP name: *IZ_PolicyZoneElevationURLaction_9*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -5487,8 +5599,9 @@ If you do not configure this policy setting, Internet Explorer will not execute
ADMX Info:
-- GP english name: *Run .NET Framework-reliant components not signed with Authenticode*
+- GP English name: *Run .NET Framework-reliant components not signed with Authenticode*
- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_9*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -5538,8 +5651,9 @@ If you do not configure this policy setting, the user can enable or disable scri
ADMX Info:
-- GP english name: *Allow scriptlets*
+- GP English name: *Allow scriptlets*
- GP name: *IZ_Policy_AllowScriptlets_9*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -5591,8 +5705,9 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt
ADMX Info:
-- GP english name: *Turn on SmartScreen Filter scan*
+- GP English name: *Turn on SmartScreen Filter scan*
- GP name: *IZ_Policy_Phishing_9*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -5642,8 +5757,9 @@ If you do not configure this policy setting, users can preserve information in t
ADMX Info:
-- GP english name: *Userdata persistence*
+- GP English name: *Userdata persistence*
- GP name: *IZ_PolicyUserdataPersistence_9*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -5685,8 +5801,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Don't run antimalware programs against ActiveX controls*
+- GP English name: *Don't run antimalware programs against ActiveX controls*
- GP name: *IZ_PolicyAntiMalwareCheckingOfActiveXControls_9*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -5738,8 +5855,9 @@ If you do not configure this policy setting, users are queried whether to allow
ADMX Info:
-- GP english name: *Initialize and script ActiveX controls not marked as safe*
+- GP English name: *Initialize and script ActiveX controls not marked as safe*
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_9*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -5781,8 +5899,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Java permissions*
+- GP English name: *Java permissions*
- GP name: *IZ_PolicyJavaPermissions_9*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -5832,8 +5951,9 @@ If you do not configure this policy setting, users can open windows and frames f
ADMX Info:
-- GP english name: *Navigate windows and frames across different domains*
+- GP English name: *Navigate windows and frames across different domains*
- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_9*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -5883,8 +6003,9 @@ If you do not configure this policy setting, users cannot load a page in the zon
ADMX Info:
-- GP english name: *Access data sources across domains*
+- GP English name: *Access data sources across domains*
- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_2*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -5934,8 +6055,9 @@ If you do not configure this policy setting, ActiveX control installations will
ADMX Info:
-- GP english name: *Automatic prompting for ActiveX controls*
+- GP English name: *Automatic prompting for ActiveX controls*
- GP name: *IZ_PolicyNotificationBarActiveXURLaction_2*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -5983,8 +6105,9 @@ If you disable or do not configure this setting, file downloads that are not use
ADMX Info:
-- GP english name: *Automatic prompting for file downloads*
+- GP English name: *Automatic prompting for file downloads*
- GP name: *IZ_PolicyNotificationBarDownloadURLaction_2*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6034,8 +6157,9 @@ If you do not configure this policy setting, HTML fonts can be downloaded automa
ADMX Info:
-- GP english name: *Allow font downloads*
+- GP English name: *Allow font downloads*
- GP name: *IZ_PolicyFontDownload_2*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6085,8 +6209,9 @@ If you do not configure this policy setting, the possibly harmful navigations ar
ADMX Info:
-- GP english name: *Web sites in less privileged Web content zones can navigate into this zone*
+- GP English name: *Web sites in less privileged Web content zones can navigate into this zone*
- GP name: *IZ_PolicyZoneElevationURLaction_2*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6136,8 +6261,9 @@ If you do not configure this policy setting, Internet Explorer will not execute
ADMX Info:
-- GP english name: *Run .NET Framework-reliant components not signed with Authenticode*
+- GP English name: *Run .NET Framework-reliant components not signed with Authenticode*
- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_2*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6187,8 +6313,9 @@ If you do not configure this policy setting, the user can enable or disable scri
ADMX Info:
-- GP english name: *Allow scriptlets*
+- GP English name: *Allow scriptlets*
- GP name: *IZ_Policy_AllowScriptlets_2*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6240,8 +6367,9 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt
ADMX Info:
-- GP english name: *Turn on SmartScreen Filter scan*
+- GP English name: *Turn on SmartScreen Filter scan*
- GP name: *IZ_Policy_Phishing_2*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6291,8 +6419,9 @@ If you do not configure this policy setting, users can preserve information in t
ADMX Info:
-- GP english name: *Userdata persistence*
+- GP English name: *Userdata persistence*
- GP name: *IZ_PolicyUserdataPersistence_2*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6344,8 +6473,9 @@ If you do not configure this policy setting, ActiveX controls that cannot be mad
ADMX Info:
-- GP english name: *Initialize and script ActiveX controls not marked as safe*
+- GP English name: *Initialize and script ActiveX controls not marked as safe*
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_2*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6387,8 +6517,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Java permissions*
+- GP English name: *Java permissions*
- GP name: *IZ_PolicyJavaPermissions_2*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6438,8 +6569,9 @@ If you do not configure this policy setting, users can open windows and frames f
ADMX Info:
-- GP english name: *Navigate windows and frames across different domains*
+- GP English name: *Navigate windows and frames across different domains*
- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_2*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6489,8 +6621,9 @@ If you do not configure this policy setting, users are queried to choose whether
ADMX Info:
-- GP english name: *Access data sources across domains*
+- GP English name: *Access data sources across domains*
- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_4*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6540,8 +6673,9 @@ If you do not configure this policy setting, ActiveX control installations will
ADMX Info:
-- GP english name: *Automatic prompting for ActiveX controls*
+- GP English name: *Automatic prompting for ActiveX controls*
- GP name: *IZ_PolicyNotificationBarActiveXURLaction_4*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6589,8 +6723,9 @@ If you disable or do not configure this setting, file downloads that are not use
ADMX Info:
-- GP english name: *Automatic prompting for file downloads*
+- GP English name: *Automatic prompting for file downloads*
- GP name: *IZ_PolicyNotificationBarDownloadURLaction_4*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6640,8 +6775,9 @@ If you do not configure this policy setting, HTML fonts can be downloaded automa
ADMX Info:
-- GP english name: *Allow font downloads*
+- GP English name: *Allow font downloads*
- GP name: *IZ_PolicyFontDownload_4*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6691,8 +6827,9 @@ If you do not configure this policy setting, the possibly harmful navigations ar
ADMX Info:
-- GP english name: *Web sites in less privileged Web content zones can navigate into this zone*
+- GP English name: *Web sites in less privileged Web content zones can navigate into this zone*
- GP name: *IZ_PolicyZoneElevationURLaction_4*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6742,8 +6879,9 @@ If you do not configure this policy setting, Internet Explorer will not execute
ADMX Info:
-- GP english name: *Run .NET Framework-reliant components not signed with Authenticode*
+- GP English name: *Run .NET Framework-reliant components not signed with Authenticode*
- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_4*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6793,8 +6931,9 @@ If you do not configure this policy setting, the user can enable or disable scri
ADMX Info:
-- GP english name: *Allow scriptlets*
+- GP English name: *Allow scriptlets*
- GP name: *IZ_Policy_AllowScriptlets_4*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6846,8 +6985,9 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt
ADMX Info:
-- GP english name: *Turn on SmartScreen Filter scan*
+- GP English name: *Turn on SmartScreen Filter scan*
- GP name: *IZ_Policy_Phishing_4*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6897,8 +7037,9 @@ If you do not configure this policy setting, users can preserve information in t
ADMX Info:
-- GP english name: *Userdata persistence*
+- GP English name: *Userdata persistence*
- GP name: *IZ_PolicyUserdataPersistence_4*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6950,8 +7091,9 @@ If you do not configure this policy setting, ActiveX controls that cannot be mad
ADMX Info:
-- GP english name: *Initialize and script ActiveX controls not marked as safe*
+- GP English name: *Initialize and script ActiveX controls not marked as safe*
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_4*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -7001,8 +7143,9 @@ If you do not configure this policy setting, users can open windows and frames f
ADMX Info:
-- GP english name: *Navigate windows and frames across different domains*
+- GP English name: *Navigate windows and frames across different domains*
- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_4*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -7052,8 +7195,9 @@ If you do not configure this policy setting, users can load a page in the zone t
ADMX Info:
-- GP english name: *Access data sources across domains*
+- GP English name: *Access data sources across domains*
- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_10*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -7103,8 +7247,9 @@ If you do not configure this policy setting, ActiveX control installations will
ADMX Info:
-- GP english name: *Automatic prompting for ActiveX controls*
+- GP English name: *Automatic prompting for ActiveX controls*
- GP name: *IZ_PolicyNotificationBarActiveXURLaction_10*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -7152,8 +7297,9 @@ If you disable or do not configure this setting, file downloads that are not use
ADMX Info:
-- GP english name: *Automatic prompting for file downloads*
+- GP English name: *Automatic prompting for file downloads*
- GP name: *IZ_PolicyNotificationBarDownloadURLaction_10*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -7203,8 +7349,9 @@ If you do not configure this policy setting, HTML fonts can be downloaded automa
ADMX Info:
-- GP english name: *Allow font downloads*
+- GP English name: *Allow font downloads*
- GP name: *IZ_PolicyFontDownload_10*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -7254,8 +7401,9 @@ If you do not configure this policy setting, the possibly harmful navigations ar
ADMX Info:
-- GP english name: *Web sites in less privileged Web content zones can navigate into this zone*
+- GP English name: *Web sites in less privileged Web content zones can navigate into this zone*
- GP name: *IZ_PolicyZoneElevationURLaction_10*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -7305,8 +7453,9 @@ If you do not configure this policy setting, Internet Explorer will not execute
ADMX Info:
-- GP english name: *Run .NET Framework-reliant components not signed with Authenticode*
+- GP English name: *Run .NET Framework-reliant components not signed with Authenticode*
- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_10*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -7356,8 +7505,9 @@ If you do not configure this policy setting, the user can enable or disable scri
ADMX Info:
-- GP english name: *Allow scriptlets*
+- GP English name: *Allow scriptlets*
- GP name: *IZ_Policy_AllowScriptlets_10*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -7409,8 +7559,9 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt
ADMX Info:
-- GP english name: *Turn on SmartScreen Filter scan*
+- GP English name: *Turn on SmartScreen Filter scan*
- GP name: *IZ_Policy_Phishing_10*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -7460,8 +7611,9 @@ If you do not configure this policy setting, users can preserve information in t
ADMX Info:
-- GP english name: *Userdata persistence*
+- GP English name: *Userdata persistence*
- GP name: *IZ_PolicyUserdataPersistence_10*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -7513,8 +7665,9 @@ If you do not configure this policy setting, ActiveX controls that cannot be mad
ADMX Info:
-- GP english name: *Initialize and script ActiveX controls not marked as safe*
+- GP English name: *Initialize and script ActiveX controls not marked as safe*
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_10*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -7556,8 +7709,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Java permissions*
+- GP English name: *Java permissions*
- GP name: *IZ_PolicyJavaPermissions_10*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -7607,8 +7761,9 @@ If you do not configure this policy setting, users can open windows and frames f
ADMX Info:
-- GP english name: *Navigate windows and frames across different domains*
+- GP English name: *Navigate windows and frames across different domains*
- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_10*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -7658,8 +7813,9 @@ If you do not configure this policy setting, users cannot load a page in the zon
ADMX Info:
-- GP english name: *Access data sources across domains*
+- GP English name: *Access data sources across domains*
- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_8*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -7709,8 +7865,9 @@ If you do not configure this policy setting, ActiveX control installations will
ADMX Info:
-- GP english name: *Automatic prompting for ActiveX controls*
+- GP English name: *Automatic prompting for ActiveX controls*
- GP name: *IZ_PolicyNotificationBarActiveXURLaction_8*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -7758,8 +7915,9 @@ If you disable or do not configure this setting, file downloads that are not use
ADMX Info:
-- GP english name: *Automatic prompting for file downloads*
+- GP English name: *Automatic prompting for file downloads*
- GP name: *IZ_PolicyNotificationBarDownloadURLaction_8*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -7809,8 +7967,9 @@ If you do not configure this policy setting, users are queried whether to allow
ADMX Info:
-- GP english name: *Allow font downloads*
+- GP English name: *Allow font downloads*
- GP name: *IZ_PolicyFontDownload_8*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -7860,8 +8019,9 @@ If you do not configure this policy setting, the possibly harmful navigations ar
ADMX Info:
-- GP english name: *Web sites in less privileged Web content zones can navigate into this zone*
+- GP English name: *Web sites in less privileged Web content zones can navigate into this zone*
- GP name: *IZ_PolicyZoneElevationURLaction_8*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -7911,8 +8071,9 @@ If you do not configure this policy setting, Internet Explorer will not execute
ADMX Info:
-- GP english name: *Run .NET Framework-reliant components not signed with Authenticode*
+- GP English name: *Run .NET Framework-reliant components not signed with Authenticode*
- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_8*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -7962,8 +8123,9 @@ If you do not configure this policy setting, the user can enable or disable scri
ADMX Info:
-- GP english name: *Allow scriptlets*
+- GP English name: *Allow scriptlets*
- GP name: *IZ_Policy_AllowScriptlets_8*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -8015,8 +8177,9 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt
ADMX Info:
-- GP english name: *Turn on SmartScreen Filter scan*
+- GP English name: *Turn on SmartScreen Filter scan*
- GP name: *IZ_Policy_Phishing_8*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -8066,8 +8229,9 @@ If you do not configure this policy setting, users cannot preserve information i
ADMX Info:
-- GP english name: *Userdata persistence*
+- GP English name: *Userdata persistence*
- GP name: *IZ_PolicyUserdataPersistence_8*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -8119,8 +8283,9 @@ If you do not configure this policy setting, ActiveX controls that cannot be mad
ADMX Info:
-- GP english name: *Initialize and script ActiveX controls not marked as safe*
+- GP English name: *Initialize and script ActiveX controls not marked as safe*
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_8*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -8162,8 +8327,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Java permissions*
+- GP English name: *Java permissions*
- GP name: *IZ_PolicyJavaPermissions_8*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -8213,8 +8379,9 @@ If you do not configure this policy setting, users cannot open other windows and
ADMX Info:
-- GP english name: *Navigate windows and frames across different domains*
+- GP English name: *Navigate windows and frames across different domains*
- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_8*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -8264,8 +8431,9 @@ If you do not configure this policy setting, users can load a page in the zone t
ADMX Info:
-- GP english name: *Access data sources across domains*
+- GP English name: *Access data sources across domains*
- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_6*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -8315,8 +8483,9 @@ If you do not configure this policy setting, ActiveX control installations will
ADMX Info:
-- GP english name: *Automatic prompting for ActiveX controls*
+- GP English name: *Automatic prompting for ActiveX controls*
- GP name: *IZ_PolicyNotificationBarActiveXURLaction_6*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -8364,8 +8533,9 @@ If you disable or do not configure this setting, file downloads that are not use
ADMX Info:
-- GP english name: *Automatic prompting for file downloads*
+- GP English name: *Automatic prompting for file downloads*
- GP name: *IZ_PolicyNotificationBarDownloadURLaction_6*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -8415,8 +8585,9 @@ If you do not configure this policy setting, HTML fonts can be downloaded automa
ADMX Info:
-- GP english name: *Allow font downloads*
+- GP English name: *Allow font downloads*
- GP name: *IZ_PolicyFontDownload_6*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -8466,8 +8637,9 @@ If you do not configure this policy setting, the possibly harmful navigations ar
ADMX Info:
-- GP english name: *Web sites in less privileged Web content zones can navigate into this zone*
+- GP English name: *Web sites in less privileged Web content zones can navigate into this zone*
- GP name: *IZ_PolicyZoneElevationURLaction_6*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -8517,8 +8689,9 @@ If you do not configure this policy setting, Internet Explorer will not execute
ADMX Info:
-- GP english name: *Run .NET Framework-reliant components not signed with Authenticode*
+- GP English name: *Run .NET Framework-reliant components not signed with Authenticode*
- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_6*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -8568,8 +8741,9 @@ If you do not configure this policy setting, the user can enable or disable scri
ADMX Info:
-- GP english name: *Allow scriptlets*
+- GP English name: *Allow scriptlets*
- GP name: *IZ_Policy_AllowScriptlets_6*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -8621,8 +8795,9 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt
ADMX Info:
-- GP english name: *Turn on SmartScreen Filter scan*
+- GP English name: *Turn on SmartScreen Filter scan*
- GP name: *IZ_Policy_Phishing_6*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -8672,8 +8847,9 @@ If you do not configure this policy setting, users can preserve information in t
ADMX Info:
-- GP english name: *Userdata persistence*
+- GP English name: *Userdata persistence*
- GP name: *IZ_PolicyUserdataPersistence_6*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -8725,8 +8901,9 @@ If you do not configure this policy setting, ActiveX controls that cannot be mad
ADMX Info:
-- GP english name: *Initialize and script ActiveX controls not marked as safe*
+- GP English name: *Initialize and script ActiveX controls not marked as safe*
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_6*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -8768,8 +8945,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Java permissions*
+- GP English name: *Java permissions*
- GP name: *IZ_PolicyJavaPermissions_6*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -8819,8 +8997,9 @@ If you do not configure this policy setting, users can open windows and frames f
ADMX Info:
-- GP english name: *Navigate windows and frames across different domains*
+- GP English name: *Navigate windows and frames across different domains*
- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_6*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -8862,8 +9041,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Internet Explorer Processes*
+- GP English name: *Internet Explorer Processes*
- GP name: *IESF_PolicyExplorerProcesses_3*
+- GP path: *Windows Components/Internet Explorer/Security Features/MK Protocol Security Restriction*
- GP ADMX file name: *inetres.admx*
@@ -8905,8 +9085,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Internet Explorer Processes*
+- GP English name: *Internet Explorer Processes*
- GP name: *IESF_PolicyExplorerProcesses_6*
+- GP path: *Windows Components/Internet Explorer/Security Features/Mime Sniffing Safety Feature*
- GP ADMX file name: *inetres.admx*
@@ -8948,8 +9129,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Internet Explorer Processes*
+- GP English name: *Internet Explorer Processes*
- GP name: *IESF_PolicyExplorerProcesses_10*
+- GP path: *Windows Components/Internet Explorer/Security Features/Notification bar*
- GP ADMX file name: *inetres.admx*
@@ -8991,8 +9173,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Prevent managing SmartScreen Filter*
+- GP English name: *Prevent managing SmartScreen Filter*
- GP name: *Disable_Managing_Safety_Filter_IE9*
+- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -9034,8 +9217,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Prevent per-user installation of ActiveX controls*
+- GP English name: *Prevent per-user installation of ActiveX controls*
- GP name: *DisablePerUserActiveXInstall*
+- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -9077,8 +9261,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *All Processes*
+- GP English name: *All Processes*
- GP name: *IESF_PolicyAllProcesses_9*
+- GP path: *Windows Components/Internet Explorer/Security Features/Protection From Zone Elevation*
- GP ADMX file name: *inetres.admx*
@@ -9120,8 +9305,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Remove "Run this time" button for outdated ActiveX controls in Internet Explorer *
+- GP English name: *Remove "Run this time" button for outdated ActiveX controls in Internet Explorer *
- GP name: *VerMgmtDisableRunThisTime*
+- GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management*
- GP ADMX file name: *inetres.admx*
@@ -9163,8 +9349,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *All Processes*
+- GP English name: *All Processes*
- GP name: *IESF_PolicyAllProcesses_11*
+- GP path: *Windows Components/Internet Explorer/Security Features/Restrict ActiveX Install*
- GP ADMX file name: *inetres.admx*
@@ -9206,8 +9393,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *All Processes*
+- GP English name: *All Processes*
- GP name: *IESF_PolicyAllProcesses_12*
+- GP path: *Windows Components/Internet Explorer/Security Features/Restrict File Download*
- GP ADMX file name: *inetres.admx*
@@ -9257,8 +9445,9 @@ If you do not configure this policy setting, users cannot load a page in the zon
ADMX Info:
-- GP english name: *Access data sources across domains*
+- GP English name: *Access data sources across domains*
- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -9300,8 +9489,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow active scripting*
+- GP English name: *Allow active scripting*
- GP name: *IZ_PolicyActiveScripting_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -9351,8 +9541,9 @@ If you do not configure this policy setting, ActiveX control installations will
ADMX Info:
-- GP english name: *Automatic prompting for ActiveX controls*
+- GP English name: *Automatic prompting for ActiveX controls*
- GP name: *IZ_PolicyNotificationBarActiveXURLaction_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -9400,8 +9591,9 @@ If you disable or do not configure this setting, file downloads that are not use
ADMX Info:
-- GP english name: *Automatic prompting for file downloads*
+- GP English name: *Automatic prompting for file downloads*
- GP name: *IZ_PolicyNotificationBarDownloadURLaction_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -9443,8 +9635,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow binary and script behaviors*
+- GP English name: *Allow binary and script behaviors*
- GP name: *IZ_PolicyBinaryBehaviors_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -9486,8 +9679,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow cut, copy or paste operations from the clipboard via script*
+- GP English name: *Allow cut, copy or paste operations from the clipboard via script*
- GP name: *IZ_PolicyAllowPasteViaScript_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -9529,8 +9723,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow drag and drop or copy and paste files*
+- GP English name: *Allow drag and drop or copy and paste files*
- GP name: *IZ_PolicyDropOrPasteFiles_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -9572,8 +9767,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow file downloads*
+- GP English name: *Allow file downloads*
- GP name: *IZ_PolicyFileDownload_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -9623,8 +9819,9 @@ If you do not configure this policy setting, users are queried whether to allow
ADMX Info:
-- GP english name: *Allow font downloads*
+- GP English name: *Allow font downloads*
- GP name: *IZ_PolicyFontDownload_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -9674,8 +9871,9 @@ If you do not configure this policy setting, the possibly harmful navigations ar
ADMX Info:
-- GP english name: *Web sites in less privileged Web content zones can navigate into this zone*
+- GP English name: *Web sites in less privileged Web content zones can navigate into this zone*
- GP name: *IZ_PolicyZoneElevationURLaction_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -9717,8 +9915,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow loading of XAML files*
+- GP English name: *Allow loading of XAML files*
- GP name: *IZ_Policy_XAML_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -9760,8 +9959,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow META REFRESH*
+- GP English name: *Allow META REFRESH*
- GP name: *IZ_PolicyAllowMETAREFRESH_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -9811,8 +10011,9 @@ If you do not configure this policy setting, Internet Explorer will not execute
ADMX Info:
-- GP english name: *Run .NET Framework-reliant components not signed with Authenticode*
+- GP English name: *Run .NET Framework-reliant components not signed with Authenticode*
- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -9854,8 +10055,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow only approved domains to use ActiveX controls without prompt*
+- GP English name: *Allow only approved domains to use ActiveX controls without prompt*
- GP name: *IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Restricted*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -9897,8 +10099,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow only approved domains to use the TDC ActiveX control*
+- GP English name: *Allow only approved domains to use the TDC ActiveX control*
- GP name: *IZ_PolicyAllowTDCControl_Both_Restricted*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -9940,8 +10143,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow script-initiated windows without size or position constraints*
+- GP English name: *Allow script-initiated windows without size or position constraints*
- GP name: *IZ_PolicyWindowsRestrictionsURLaction_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -9983,8 +10187,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow scripting of Internet Explorer WebBrowser controls*
+- GP English name: *Allow scripting of Internet Explorer WebBrowser controls*
- GP name: *IZ_Policy_WebBrowserControl_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -10034,8 +10239,9 @@ If you do not configure this policy setting, the user can enable or disable scri
ADMX Info:
-- GP english name: *Allow scriptlets*
+- GP English name: *Allow scriptlets*
- GP name: *IZ_Policy_AllowScriptlets_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -10087,8 +10293,9 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt
ADMX Info:
-- GP english name: *Turn on SmartScreen Filter scan*
+- GP English name: *Turn on SmartScreen Filter scan*
- GP name: *IZ_Policy_Phishing_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -10130,8 +10337,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow updates to status bar via script*
+- GP English name: *Allow updates to status bar via script*
- GP name: *IZ_Policy_ScriptStatusBar_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -10181,8 +10389,9 @@ If you do not configure this policy setting, users cannot preserve information i
ADMX Info:
-- GP english name: *Userdata persistence*
+- GP English name: *Userdata persistence*
- GP name: *IZ_PolicyUserdataPersistence_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -10224,8 +10433,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Don't run antimalware programs against ActiveX controls*
+- GP English name: *Don't run antimalware programs against ActiveX controls*
- GP name: *IZ_PolicyAntiMalwareCheckingOfActiveXControls_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -10267,8 +10477,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Download signed ActiveX controls*
+- GP English name: *Download signed ActiveX controls*
- GP name: *IZ_PolicyDownloadSignedActiveX_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -10310,8 +10521,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Download unsigned ActiveX controls*
+- GP English name: *Download unsigned ActiveX controls*
- GP name: *IZ_PolicyDownloadUnsignedActiveX_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -10353,8 +10565,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Turn on Cross-Site Scripting Filter*
+- GP English name: *Turn on Cross-Site Scripting Filter*
- GP name: *IZ_PolicyTurnOnXSSFilter_Both_Restricted*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -10396,8 +10609,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Enable dragging of content from different domains across windows*
+- GP English name: *Enable dragging of content from different domains across windows*
- GP name: *IZ_PolicyDragDropAcrossDomainsAcrossWindows_Both_Restricted*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -10439,8 +10653,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Enable dragging of content from different domains within a window*
+- GP English name: *Enable dragging of content from different domains within a window*
- GP name: *IZ_PolicyDragDropAcrossDomainsWithinWindow_Both_Restricted*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -10482,8 +10697,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Enable MIME Sniffing*
+- GP English name: *Enable MIME Sniffing*
- GP name: *IZ_PolicyMimeSniffingURLaction_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -10525,8 +10741,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Include local path when user is uploading files to a server*
+- GP English name: *Include local path when user is uploading files to a server*
- GP name: *IZ_Policy_LocalPathForUpload_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -10578,8 +10795,9 @@ If you do not configure this policy setting, ActiveX controls that cannot be mad
ADMX Info:
-- GP english name: *Initialize and script ActiveX controls not marked as safe*
+- GP English name: *Initialize and script ActiveX controls not marked as safe*
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -10621,8 +10839,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Java permissions*
+- GP English name: *Java permissions*
- GP name: *IZ_PolicyJavaPermissions_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -10664,8 +10883,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Launching applications and files in an IFRAME*
+- GP English name: *Launching applications and files in an IFRAME*
- GP name: *IZ_PolicyLaunchAppsAndFilesInIFRAME_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -10707,8 +10927,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Logon options*
+- GP English name: *Logon options*
- GP name: *IZ_PolicyLogon_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -10758,8 +10979,9 @@ If you do not configure this policy setting, users cannot open other windows and
ADMX Info:
-- GP english name: *Navigate windows and frames across different domains*
+- GP English name: *Navigate windows and frames across different domains*
- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -10801,8 +11023,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Navigate windows and frames across different domains*
+- GP English name: *Navigate windows and frames across different domains*
- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -10844,8 +11067,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Run ActiveX controls and plugins*
+- GP English name: *Run ActiveX controls and plugins*
- GP name: *IZ_PolicyRunActiveXControls_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -10887,8 +11111,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Run .NET Framework-reliant components signed with Authenticode*
+- GP English name: *Run .NET Framework-reliant components signed with Authenticode*
- GP name: *IZ_PolicySignedFrameworkComponentsURLaction_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -10930,8 +11155,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Script ActiveX controls marked safe for scripting*
+- GP English name: *Script ActiveX controls marked safe for scripting*
- GP name: *IZ_PolicyScriptActiveXMarkedSafe_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -10973,8 +11199,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Scripting of Java applets*
+- GP English name: *Scripting of Java applets*
- GP name: *IZ_PolicyScriptingOfJavaApplets_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -11016,8 +11243,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Show security warning for potentially unsafe files*
+- GP English name: *Show security warning for potentially unsafe files*
- GP name: *IZ_Policy_UnsafeFiles_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -11059,8 +11287,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Turn on Cross-Site Scripting Filter*
+- GP English name: *Turn on Cross-Site Scripting Filter*
- GP name: *IZ_PolicyTurnOnXSSFilter_Both_Restricted*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -11102,8 +11331,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Turn on Protected Mode*
+- GP English name: *Turn on Protected Mode*
- GP name: *IZ_Policy_TurnOnProtectedMode_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -11145,8 +11375,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Use Pop-up Blocker*
+- GP English name: *Use Pop-up Blocker*
- GP name: *IZ_PolicyBlockPopupWindows_7*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -11188,8 +11419,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *All Processes*
+- GP English name: *All Processes*
- GP name: *IESF_PolicyAllProcesses_8*
+- GP path: *Windows Components/Internet Explorer/Security Features/Scripted Window Security Restrictions*
- GP ADMX file name: *inetres.admx*
@@ -11237,8 +11469,9 @@ If you disable or do not configure this policy setting, the user can configure h
ADMX Info:
-- GP english name: *Restrict search providers to a specific list*
+- GP English name: *Restrict search providers to a specific list*
- GP name: *SpecificSearchProvider*
+- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -11280,8 +11513,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Security Zones: Use only machine settings *
+- GP English name: *Security Zones: Use only machine settings *
- GP name: *Security_HKLM_only*
+- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -11323,8 +11557,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Specify use of ActiveX Installer Service for installation of ActiveX controls*
+- GP English name: *Specify use of ActiveX Installer Service for installation of ActiveX controls*
- GP name: *OnlyUseAXISForActiveXInstall*
+- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -11374,8 +11609,9 @@ If you do not configure this policy setting, users can load a page in the zone t
ADMX Info:
-- GP english name: *Access data sources across domains*
+- GP English name: *Access data sources across domains*
- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_5*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -11425,8 +11661,9 @@ If you do not configure this policy setting, users will receive a prompt when a
ADMX Info:
-- GP english name: *Automatic prompting for ActiveX controls*
+- GP English name: *Automatic prompting for ActiveX controls*
- GP name: *IZ_PolicyNotificationBarActiveXURLaction_5*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -11474,8 +11711,9 @@ If you disable or do not configure this setting, users will receive a file downl
ADMX Info:
-- GP english name: *Automatic prompting for file downloads*
+- GP English name: *Automatic prompting for file downloads*
- GP name: *IZ_PolicyNotificationBarDownloadURLaction_5*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -11525,8 +11763,9 @@ If you do not configure this policy setting, HTML fonts can be downloaded automa
ADMX Info:
-- GP english name: *Allow font downloads*
+- GP English name: *Allow font downloads*
- GP name: *IZ_PolicyFontDownload_5*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -11576,8 +11815,9 @@ If you do not configure this policy setting, a warning is issued to the user tha
ADMX Info:
-- GP english name: *Web sites in less privileged Web content zones can navigate into this zone*
+- GP English name: *Web sites in less privileged Web content zones can navigate into this zone*
- GP name: *IZ_PolicyZoneElevationURLaction_5*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -11627,8 +11867,9 @@ If you do not configure this policy setting, Internet Explorer will execute unsi
ADMX Info:
-- GP english name: *Run .NET Framework-reliant components not signed with Authenticode*
+- GP English name: *Run .NET Framework-reliant components not signed with Authenticode*
- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_5*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -11678,8 +11919,9 @@ If you do not configure this policy setting, the user can enable or disable scri
ADMX Info:
-- GP english name: *Allow scriptlets*
+- GP English name: *Allow scriptlets*
- GP name: *IZ_Policy_AllowScriptlets_5*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -11731,8 +11973,9 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt
ADMX Info:
-- GP english name: *Turn on SmartScreen Filter scan*
+- GP English name: *Turn on SmartScreen Filter scan*
- GP name: *IZ_Policy_Phishing_5*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -11782,8 +12025,9 @@ If you do not configure this policy setting, users can preserve information in t
ADMX Info:
-- GP english name: *Userdata persistence*
+- GP English name: *Userdata persistence*
- GP name: *IZ_PolicyUserdataPersistence_5*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -11825,8 +12069,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Don't run antimalware programs against ActiveX controls*
+- GP English name: *Don't run antimalware programs against ActiveX controls*
- GP name: *IZ_PolicyAntiMalwareCheckingOfActiveXControls_5*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -11868,8 +12113,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Don't run antimalware programs against ActiveX controls*
+- GP English name: *Don't run antimalware programs against ActiveX controls*
- GP name: *IZ_PolicyAntiMalwareCheckingOfActiveXControls_5*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -11921,8 +12167,9 @@ If you do not configure this policy setting, users are queried whether to allow
ADMX Info:
-- GP english name: *Initialize and script ActiveX controls not marked as safe*
+- GP English name: *Initialize and script ActiveX controls not marked as safe*
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_5*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -11964,8 +12211,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Initialize and script ActiveX controls not marked as safe*
+- GP English name: *Initialize and script ActiveX controls not marked as safe*
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_5*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -12007,8 +12255,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Initialize and script ActiveX controls not marked as safe*
+- GP English name: *Initialize and script ActiveX controls not marked as safe*
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_5*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -12050,8 +12299,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Java permissions*
+- GP English name: *Java permissions*
- GP name: *IZ_PolicyJavaPermissions_5*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -12101,8 +12351,9 @@ If you do not configure this policy setting, users can open windows and frames f
ADMX Info:
-- GP english name: *Navigate windows and frames across different domains*
+- GP English name: *Navigate windows and frames across different domains*
- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_5*
+- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
diff --git a/windows/client-management/mdm/policy-csp-kerberos.md b/windows/client-management/mdm/policy-csp-kerberos.md
index 801ebc1f70..d4683f4ded 100644
--- a/windows/client-management/mdm/policy-csp-kerberos.md
+++ b/windows/client-management/mdm/policy-csp-kerberos.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Kerberos
@@ -62,8 +62,9 @@ If you disable or do not configure this policy setting, the Kerberos client does
ADMX Info:
-- GP english name: *Use forest search order*
+- GP English name: *Use forest search order*
- GP name: *ForestSearch*
+- GP path: *System/Kerberos*
- GP ADMX file name: *Kerberos.admx*
@@ -110,8 +111,9 @@ If you disable or do not configure this policy setting, the client devices will
ADMX Info:
-- GP english name: *Kerberos client support for claims, compound authentication and Kerberos armoring*
+- GP English name: *Kerberos client support for claims, compound authentication and Kerberos armoring*
- GP name: *EnableCbacAndArmor*
+- GP path: *System/Kerberos*
- GP ADMX file name: *Kerberos.admx*
@@ -163,8 +165,9 @@ If you disable or do not configure this policy setting, the client computers in
ADMX Info:
-- GP english name: *Fail authentication requests when Kerberos armoring is not available*
+- GP English name: *Fail authentication requests when Kerberos armoring is not available*
- GP name: *ClientRequireFast*
+- GP path: *System/Kerberos*
- GP ADMX file name: *Kerberos.admx*
@@ -212,8 +215,9 @@ If you disable or do not configure this policy setting, the Kerberos client requ
ADMX Info:
-- GP english name: *Require strict KDC validation*
+- GP English name: *Require strict KDC validation*
- GP name: *ValidateKDC*
+- GP path: *System/Kerberos*
- GP ADMX file name: *Kerberos.admx*
@@ -265,8 +269,9 @@ Note: This policy setting configures the existing MaxTokenSize registry value in
ADMX Info:
-- GP english name: *Set maximum Kerberos SSPI context token buffer size*
+- GP English name: *Set maximum Kerberos SSPI context token buffer size*
- GP name: *MaxTokenSize*
+- GP path: *System/Kerberos*
- GP ADMX file name: *Kerberos.admx*
diff --git a/windows/client-management/mdm/policy-csp-licensing.md b/windows/client-management/mdm/policy-csp-licensing.md
index 192795ada2..a8f855bc5e 100644
--- a/windows/client-management/mdm/policy-csp-licensing.md
+++ b/windows/client-management/mdm/policy-csp-licensing.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Licensing
diff --git a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md
new file mode 100644
index 0000000000..5eb02ceae2
--- /dev/null
+++ b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md
@@ -0,0 +1,1025 @@
+---
+title: Policy CSP - LocalPoliciesSecurityOptions
+description: Policy CSP - LocalPoliciesSecurityOptions
+ms.author: maricia
+ms.topic: article
+ms.prod: w10
+ms.technology: windows
+author: nickbrower
+ms.date: 08/30/2017
+---
+
+# Policy CSP - LocalPoliciesSecurityOptions
+
+> [!WARNING]
+> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
+
+
+
+
+## LocalPoliciesSecurityOptions policies
+
+
+**LocalPoliciesSecurityOptions/Accounts_BlockMicrosoftAccounts**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+This policy setting prevents users from adding new Microsoft accounts on this computer.
+
+If you select the "Users cannot add Microsoft accounts" option, users will not be able to create new Microsoft accounts on this computer, switch a local account to a Microsoft account, or connect a domain account to a Microsoft account. This is the preferred option if you need to limit the use of Microsoft accounts in your enterprise.
+
+If you select the "Users cannot add or log on with Microsoft accounts" option, existing Microsoft account users will not be able to log on to Windows. Selecting this option might make it impossible for an existing administrator on this computer to log on and manage the system.
+
+If you disable or do not configure this policy (recommended), users will be able to use Microsoft accounts with Windows.
+
+Valid values:
+- 0 - disabled (users will be able to use Microsoft accounts with Windows)
+- 1 - enabled (users cannot add Microsoft accounts)
+Value type is integer. Supported operations are Add, Get, Replace, and Delete.
+
+
+
+
+**LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatus**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+This security setting determines whether the local Administrator account is enabled or disabled.
+
+If you try to reenable the Administrator account after it has been disabled, and if the current Administrator password does not meet the password requirements, you cannot reenable the account. In this case, an alternative member of the Administrators group must reset the password on the Administrator account. For information about how to reset a password, see To reset a password.
+Disabling the Administrator account can become a maintenance issue under certain circumstances.
+
+Under Safe Mode boot, the disabled Administrator account will only be enabled if the machine is non-domain joined and there are no other local active administrator accounts. If the computer is domain joined the disabled administrator will not be enabled.
+
+Default: Disabled.
+Valid values:
+- 0 - local Administrator account is disabled
+- 1 - local Administrator account is enabled
+
+Value type is integer. Supported operations are Add, Get, Replace, and Delete.
+
+
+
+
+**LocalPoliciesSecurityOptions/Accounts_EnableGuestAccountStatus**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+This security setting determines if the Guest account is enabled or disabled.
+
+Default: Disabled.
+Valid values:
+- 0 - local Guest account is disabled
+- 1 - local Guest account is enabled
+
+Note: If the Guest account is disabled and the security option Network Access: Sharing and Security Model for local accounts is set to Guest Only, network logons, such as those performed by the Microsoft Network Server (SMB Service), will fail.
+
+Value type is integer. Supported operations are Add, Get, Replace, and Delete.
+
+
+
+
+**LocalPoliciesSecurityOptions/Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+Accounts: Limit local account use of blank passwords to console logon only
+
+This security setting determines whether local accounts that are not password protected can be used to log on from locations other than the physical computer console. If enabled, local accounts that are not password protected will only be able to log on at the computer's keyboard.
+
+Default: Enabled.
+Valid values:
+- 0 - disabled - local accounts that are not password protected can be used to log on from locations other than the physical computer console
+- 1 - enabled - local accounts that are not password protected will only be able to log on at the computer's keyboard
+
+Warning:
+
+Computers that are not in physically secure locations should always enforce strong password policies for all local user accounts. Otherwise, anyone with physical access to the computer can log on by using a user account that does not have a password. This is especially important for portable computers.
+If you apply this security policy to the Everyone group, no one will be able to log on through Remote Desktop Services.
+
+This setting does not affect logons that use domain accounts.
+It is possible for applications that use remote interactive logons to bypass this setting.
+
+Value type is integer. Supported operations are Add, Get, Replace, and Delete.
+
+
+
+
+**LocalPoliciesSecurityOptions/Accounts_RenameAdministratorAccount**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+Accounts: Rename administrator account
+
+This security setting determines whether a different account name is associated with the security identifier (SID) for the account Administrator. Renaming the well-known Administrator account makes it slightly more difficult for unauthorized persons to guess this privileged user name and password combination.
+
+Default: Administrator.
+
+Value type is string. Supported operations are Add, Get, Replace, and Delete.
+
+
+
+
+**LocalPoliciesSecurityOptions/Accounts_RenameGuestAccount**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+Accounts: Rename guest account
+
+This security setting determines whether a different account name is associated with the security identifier (SID) for the account "Guest." Renaming the well-known Guest account makes it slightly more difficult for unauthorized persons to guess this user name and password combination.
+
+Default: Guest.
+
+Value type is string. Supported operations are Add, Get, Replace, and Delete.
+
+
+
+
+**LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+Interactive Logon:Display user information when the session is locked
+
+Valid values:
+- 1 - User display name, domain and user names
+- 2 - User display name only
+- 3 - Do not display user information
+
+Value type is integer. Supported operations are Add, Get, Replace, and Delete.
+
+
+
+
+**LocalPoliciesSecurityOptions/InteractiveLogon_DoNotDisplayLastSignedIn**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+Interactive logon: Don't display last signed-in
+
+This security setting determines whether the Windows sign-in screen will show the username of the last person who signed in on this PC.
+If this policy is enabled, the username will not be shown.
+
+If this policy is disabled, the username will be shown.
+
+Default: Disabled.
+Valid values:
+- 0 - disabled (username will be shown)
+- 1 - enabled (username will not be shown)
+
+Value type is integer. Supported operations are Add, Get, Replace, and Delete.
+
+
+
+
+**LocalPoliciesSecurityOptions/InteractiveLogon_DoNotDisplayUsernameAtSignIn**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+Interactive logon: Don't display username at sign-in
+
+This security setting determines whether the username of the person signing in to this PC appears at Windows sign-in, after credentials are entered, and before the PC desktop is shown.
+
+If this policy is enabled, the username will not be shown.
+
+If this policy is disabled, the username will be shown.
+
+Default: Disabled.
+Valid values:
+- 0 - disabled (username will be shown)
+- 1 - enabled (username will not be shown)
+
+Value type is integer. Supported operations are Add, Get, Replace, and Delete.
+
+
+
+
+**LocalPoliciesSecurityOptions/InteractiveLogon_DoNotRequireCTRLALTDEL**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+Interactive logon: Do not require CTRL+ALT+DEL
+
+This security setting determines whether pressing CTRL+ALT+DEL is required before a user can log on.
+
+If this policy is enabled on a computer, a user is not required to press CTRL+ALT+DEL to log on. Not having to press CTRL+ALT+DEL leaves users susceptible to attacks that attempt to intercept the users' passwords. Requiring CTRL+ALT+DEL before users log on ensures that users are communicating by means of a trusted path when entering their passwords.
+
+If this policy is disabled, any user is required to press CTRL+ALT+DEL before logging on to Windows.
+
+Default on domain-computers: Enabled: At least Windows 8/Disabled: Windows 7 or earlier.
+Default on stand-alone computers: Enabled.
+Valid values:
+- 0 - disabled
+- 1 - enabled (a user is not required to press CTRL+ALT+DEL to log on)
+
+Value type is integer. Supported operations are Add, Get, Replace, and Delete.
+
+
+
+
+**LocalPoliciesSecurityOptions/InteractiveLogon_MachineInactivityLimit**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+Interactive logon: Machine inactivity limit.
+
+Windows notices inactivity of a logon session, and if the amount of inactive time exceeds the inactivity limit, then the screen saver will run, locking the session.
+
+Default: not enforced.
+Valid values:
+- 0 - disabled
+- 1 - enabled (session will lock after amount of inactive time exceeds the inactivity limit)
+
+Value type is integer. Supported operations are Add, Get, Replace, and Delete.
+
+
+
+
+**LocalPoliciesSecurityOptions/InteractiveLogon_MessageTextForUsersAttemptingToLogOn**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+Interactive logon: Message text for users attempting to log on
+
+This security setting specifies a text message that is displayed to users when they log on.
+
+This text is often used for legal reasons, for example, to warn users about the ramifications of misusing company information or to warn them that their actions may be audited.
+
+Default: No message.
+
+Value type is string. Supported operations are Add, Get, Replace, and Delete.
+
+
+
+
+**LocalPoliciesSecurityOptions/InteractiveLogon_MessageTitleForUsersAttemptingToLogOn**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+Interactive logon: Message title for users attempting to log on
+
+This security setting allows the specification of a title to appear in the title bar of the window that contains the Interactive logon: Message text for users attempting to log on.
+
+Default: No message.
+
+Value type is string. Supported operations are Add, Get, Replace, and Delete.
+
+
+
+
+**LocalPoliciesSecurityOptions/NetworkSecurity_AllowPKU2UAuthenticationRequests**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+Network security: Allow PKU2U authentication requests to this computer to use online identities.
+
+This policy will be turned off by default on domain joined machines. This would prevent online identities from authenticating to the domain joined machine.
+
+Valid values:
+- 0 - disabled
+- 1 - enabled (allow PKU2U authentication requests to this computer to use online identities.)
+
+Value type is integer. Supported operations are Add, Get, Replace, and Delete.
+
+
+
+
+**LocalPoliciesSecurityOptions/RecoveryConsole_AllowAutomaticAdministrativeLogon**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+Recovery console: Allow automatic administrative logon
+
+This security setting determines if the password for the Administrator account must be given before access to the system is granted. If this option is enabled, the Recovery Console does not require you to provide a password, and it automatically logs on to the system.
+
+Default: This policy is not defined and automatic administrative logon is not allowed.
+Valid values:
+- 0 - disabled
+- 1 - enabled (allow automatic administrative logon)
+
+Value type is integer. Supported operations are Add, Get, Replace, and Delete.
+
+
+
+
+**LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+Shutdown: Allow system to be shut down without having to log on
+
+This security setting determines whether a computer can be shut down without having to log on to Windows.
+
+When this policy is enabled, the Shut Down command is available on the Windows logon screen.
+
+When this policy is disabled, the option to shut down the computer does not appear on the Windows logon screen. In this case, users must be able to log on to the computer successfully and have the Shut down the system user right before they can perform a system shutdown.
+
+Default on workstations: Enabled.
+Default on servers: Disabled.
+Valid values:
+- 0 - disabled
+- 1 - enabled (allow system to be shut down without having to log on)
+
+Value type is integer. Supported operations are Add, Get, Replace, and Delete.
+
+
+
+
+**LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop.
+
+This policy setting controls whether User Interface Accessibility (UIAccess or UIA) programs can automatically disable the secure desktop for elevation prompts used by a standard user.
+
+Enabled: UIA programs, including Windows Remote Assistance, automatically disable the secure desktop for elevation prompts. If you do not disable the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting, the prompts appear on the interactive user's desktop instead of the secure desktop.
+
+Disabled: (Default)
+Valid values:
+- 0 - disabled
+- 1 - enabled (allow UIAccess applications to prompt for elevation without using the secure desktop)
+
+The secure desktop can be disabled only by the user of the interactive desktop or by disabling the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting.
+
+Value type is integer. Supported operations are Add, Get, Replace, and Delete.
+
+
+
+
+**LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForAdministrators**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode
+
+This policy setting controls the behavior of the elevation prompt for administrators.
+
+The options are:
+
+• Elevate without prompting: Allows privileged accounts to perform an operation that requires elevation without requiring consent or credentials. Note: Use this option only in the most constrained environments.
+
+• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a privileged user name and password. If the user enters valid credentials, the operation continues with the user's highest available privilege.
+
+• Prompt for consent on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.
+
+• Prompt for credentials: When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
+
+• Prompt for consent: When an operation requires elevation of privilege, the user is prompted to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.
+
+• Prompt for consent for non-Windows binaries: (Default) When an operation for a non-Microsoft application requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.
+
+Value type is integer. Supported operations are Add, Get, Replace, and Delete.
+
+
+
+
+**LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+User Account Control: Behavior of the elevation prompt for standard users
+This policy setting controls the behavior of the elevation prompt for standard users.
+
+The options are:
+
+• Prompt for credentials: (Default) When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
+
+• Automatically deny elevation requests: When an operation requires elevation of privilege, a configurable access denied error message is displayed. An enterprise that is running desktops as standard user may choose this setting to reduce help desk calls.
+
+• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
+
+Value type is integer. Supported operations are Add, Get, Replace, and Delete.
+
+
+
+
+**LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateExecutableFilesThatAreSignedAndValidated**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+User Account Control: Only elevate executable files that are signed and validated
+
+This policy setting enforces public key infrastructure (PKI) signature checks for any interactive applications that request elevation of privilege. Enterprise administrators can control which applications are allowed to run by adding certificates to the Trusted Publishers certificate store on local computers.
+
+The options are:
+- 0 - Disabled: (Default) Does not enforce PKI certification path validation before a given executable file is permitted to run.
+- 1 - Enabled: Enforces the PKI certification path validation for a given executable file before it is permitted to run.
+
+Value type is integer. Supported operations are Add, Get, Replace, and Delete.
+
+
+
+
+**LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+User Account Control: Only elevate UIAccess applications that are installed in secure locations
+
+This policy setting controls whether applications that request to run with a User Interface Accessibility (UIAccess) integrity level must reside in a secure location in the file system. Secure locations are limited to the following:
+
+- …\Program Files\, including subfolders
+- …\Windows\system32\
+- …\Program Files (x86)\, including subfolders for 64-bit versions of Windows
+
+Note: Windows enforces a public key infrastructure (PKI) signature check on any interactive application that requests to run with a UIAccess integrity level regardless of the state of this security setting.
+
+The options are:
+- 0 - Disabled: An application runs with UIAccess integrity even if it does not reside in a secure location in the file system.
+- 1 - Enabled: (Default) If an application resides in a secure location in the file system, it runs only with UIAccess integrity.
+
+Value type is integer. Supported operations are Add, Get, Replace, and Delete.
+
+
+
+
+**LocalPoliciesSecurityOptions/UserAccountControl_RunAllAdministratorsInAdminApprovalMode**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+User Account Control: Turn on Admin Approval Mode
+
+This policy setting controls the behavior of all User Account Control (UAC) policy settings for the computer. If you change this policy setting, you must restart your computer.
+
+The options are:
+- 0 - Disabled: Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced.
+- 1 - Enabled: (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode.
+
+
+Value type is integer. Supported operations are Add, Get, Replace, and Delete.
+
+
+
+
+**LocalPoliciesSecurityOptions/UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+User Account Control: Switch to the secure desktop when prompting for elevation
+
+This policy setting controls whether the elevation request prompt is displayed on the interactive user's desktop or the secure desktop.
+
+The options are:
+- 0 - Disabled: All elevation requests go to the interactive user's desktop. Prompt behavior policy settings for administrators and standard users are used.
+- 1 - Enabled: (Default) All elevation requests go to the secure desktop regardless of prompt behavior policy settings for administrators and standard users.
+
+Value type is integer. Supported operations are Add, Get, Replace, and Delete.
+
+
+
+
+**LocalPoliciesSecurityOptions/UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+User Account Control: Virtualize file and registry write failures to per-user locations
+
+This policy setting controls whether application write failures are redirected to defined registry and file system locations. This policy setting mitigates applications that run as administrator and write run-time application data to %ProgramFiles%, %Windir%, %Windir%\system32, or HKLM\Software.
+
+The options are:
+- 0 - Disabled: Applications that write data to protected locations fail.
+- 1 - Enabled: (Default) Application write failures are redirected at run time to defined user locations for both the file system and registry.
+
+Value type is integer. Supported operations are Add, Get, Replace, and Delete.
+
+
+
+
+
+Footnote:
+
+- 1 - Added in Windows 10, version 1607.
+- 2 - Added in Windows 10, version 1703.
+- 3 - Added in Windows 10, version 1709.
+
+
+
diff --git a/windows/client-management/mdm/policy-csp-location.md b/windows/client-management/mdm/policy-csp-location.md
index ba133e1921..130111a793 100644
--- a/windows/client-management/mdm/policy-csp-location.md
+++ b/windows/client-management/mdm/policy-csp-location.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Location
diff --git a/windows/client-management/mdm/policy-csp-lockdown.md b/windows/client-management/mdm/policy-csp-lockdown.md
index a98d78e52b..ff2b494dee 100644
--- a/windows/client-management/mdm/policy-csp-lockdown.md
+++ b/windows/client-management/mdm/policy-csp-lockdown.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - LockDown
diff --git a/windows/client-management/mdm/policy-csp-maps.md b/windows/client-management/mdm/policy-csp-maps.md
index 27d44175e4..40abac41bc 100644
--- a/windows/client-management/mdm/policy-csp-maps.md
+++ b/windows/client-management/mdm/policy-csp-maps.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Maps
diff --git a/windows/client-management/mdm/policy-csp-messaging.md b/windows/client-management/mdm/policy-csp-messaging.md
index e0c705d31b..edaff6765e 100644
--- a/windows/client-management/mdm/policy-csp-messaging.md
+++ b/windows/client-management/mdm/policy-csp-messaging.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Messaging
diff --git a/windows/client-management/mdm/policy-csp-networkisolation.md b/windows/client-management/mdm/policy-csp-networkisolation.md
index 0d59b01e1b..3196840a3b 100644
--- a/windows/client-management/mdm/policy-csp-networkisolation.md
+++ b/windows/client-management/mdm/policy-csp-networkisolation.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - NetworkIsolation
diff --git a/windows/client-management/mdm/policy-csp-notifications.md b/windows/client-management/mdm/policy-csp-notifications.md
index fa41ee2efb..2a291f8ba6 100644
--- a/windows/client-management/mdm/policy-csp-notifications.md
+++ b/windows/client-management/mdm/policy-csp-notifications.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Notifications
diff --git a/windows/client-management/mdm/policy-csp-power.md b/windows/client-management/mdm/policy-csp-power.md
index f3bb408651..17298b3cdf 100644
--- a/windows/client-management/mdm/policy-csp-power.md
+++ b/windows/client-management/mdm/policy-csp-power.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Power
@@ -62,8 +62,9 @@ If you disable this policy setting, standby states (S1-S3) are not allowed.
ADMX Info:
-- GP english name: *Allow standby states (S1-S3) when sleeping (plugged in)*
+- GP English name: *Allow standby states (S1-S3) when sleeping (plugged in)*
- GP name: *AllowStandbyStatesAC_2*
+- GP path: *System/Power Management/Sleep Settings*
- GP ADMX file name: *power.admx*
@@ -113,8 +114,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Turn off the display (on battery)*
+- GP English name: *Turn off the display (on battery)*
- GP name: *VideoPowerDownTimeOutDC_2*
+- GP path: *System/Power Management/Video and Display Settings*
- GP ADMX file name: *power.admx*
@@ -164,8 +166,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Turn off the display (plugged in)*
+- GP English name: *Turn off the display (plugged in)*
- GP name: *VideoPowerDownTimeOutAC_2*
+- GP path: *System/Power Management/Video and Display Settings*
- GP ADMX file name: *power.admx*
@@ -216,8 +219,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Specify the system hibernate timeout (on battery)*
+- GP English name: *Specify the system hibernate timeout (on battery)*
- GP name: *DCHibernateTimeOut_2*
+- GP path: *System/Power Management/Sleep Settings*
- GP ADMX file name: *power.admx*
@@ -267,8 +271,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Specify the system hibernate timeout (plugged in)*
+- GP English name: *Specify the system hibernate timeout (plugged in)*
- GP name: *ACHibernateTimeOut_2*
+- GP path: *System/Power Management/Sleep Settings*
- GP ADMX file name: *power.admx*
@@ -316,8 +321,9 @@ If you disable this policy setting, the user is not prompted for a password when
ADMX Info:
-- GP english name: *Require a password when a computer wakes (on battery)*
+- GP English name: *Require a password when a computer wakes (on battery)*
- GP name: *DCPromptForPasswordOnResume_2*
+- GP path: *System/Power Management/Sleep Settings*
- GP ADMX file name: *power.admx*
@@ -365,8 +371,9 @@ If you disable this policy setting, the user is not prompted for a password when
ADMX Info:
-- GP english name: *Require a password when a computer wakes (plugged in)*
+- GP English name: *Require a password when a computer wakes (plugged in)*
- GP name: *ACPromptForPasswordOnResume_2*
+- GP path: *System/Power Management/Sleep Settings*
- GP ADMX file name: *power.admx*
@@ -416,8 +423,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Specify the system sleep timeout (on battery)*
+- GP English name: *Specify the system sleep timeout (on battery)*
- GP name: *DCStandbyTimeOut_2*
+- GP path: *System/Power Management/Sleep Settings*
- GP ADMX file name: *power.admx*
@@ -467,8 +475,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Specify the system sleep timeout (plugged in)*
+- GP English name: *Specify the system sleep timeout (plugged in)*
- GP name: *ACStandbyTimeOut_2*
+- GP path: *System/Power Management/Sleep Settings*
- GP ADMX file name: *power.admx*
diff --git a/windows/client-management/mdm/policy-csp-printers.md b/windows/client-management/mdm/policy-csp-printers.md
index 2fd40ada12..ffd1d93c3c 100644
--- a/windows/client-management/mdm/policy-csp-printers.md
+++ b/windows/client-management/mdm/policy-csp-printers.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Printers
@@ -75,8 +75,9 @@ If you disable this policy setting:
ADMX Info:
-- GP english name: *Point and Print Restrictions*
+- GP English name: *Point and Print Restrictions*
- GP name: *PointAndPrint_Restrictions_Win7*
+- GP path: *Printers*
- GP ADMX file name: *Printing.admx*
@@ -137,8 +138,9 @@ If you disable this policy setting:
ADMX Info:
-- GP english name: *Point and Print Restrictions*
+- GP English name: *Point and Print Restrictions*
- GP name: *PointAndPrint_Restrictions*
+- GP path: *Control Panel/Printers*
- GP ADMX file name: *Printing.admx*
@@ -188,8 +190,9 @@ Note: This settings takes priority over the setting "Automatically publish new p
ADMX Info:
-- GP english name: *Allow printers to be published*
+- GP English name: *Allow printers to be published*
- GP name: *PublishPrinters*
+- GP path: *Printers*
- GP ADMX file name: *Printing2.admx*
diff --git a/windows/client-management/mdm/policy-csp-privacy.md b/windows/client-management/mdm/policy-csp-privacy.md
index 64b43c3fd9..fae39d1341 100644
--- a/windows/client-management/mdm/policy-csp-privacy.md
+++ b/windows/client-management/mdm/policy-csp-privacy.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Privacy
@@ -34,11 +34,11 @@ ms.date: 07/14/2017
Mobile Enterprise |
- 1 |
- 1 |
+ 3 |
+ 3 |
|
- 1 |
- 1 |
+ 3 |
+ 3 |
 |
 |
@@ -48,6 +48,9 @@ ms.date: 07/14/2017
Allows or disallows the automatic acceptance of the pairing and privacy user consent dialog when launching apps.
+> [!Note]
+> There were issues reported with the previous release of this policy and a fix was added in Windows 10, version 1709.
+
The following list shows the supported values:
- 0 (default)– Not allowed.
@@ -133,6 +136,42 @@ ms.date: 07/14/2017
Most restricted value is 0.
+
+
+
+**Privacy/EnableActivityFeed**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+
+
+
+
+
+Added in Windows 10, version 1709. Allows IT Admins to allow Apps/OS to publish to the activity feed.
+
+The following list shows the supported values:
+
+- 0 – Disabled. Apps/OS can't publish the activities and roaming is disabled. (not published to the cloud).
+- 1 – (default) Enabled. Apps/OS can publish the activities and will be roamed across device graph.
+
@@ -2503,6 +2542,42 @@ ms.date: 07/14/2017
Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the 'sync with devices' privacy setting for the listed apps. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps.
+
+
+
+**Privacy/PublishUserActivities**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+
+
+
+
+
+Added in Windows 10, version 1709. Allows It Admins to enable publishing of user activities to the activity feed.
+
+The following list shows the supported values:
+
+- 0 – Disabled. Apps/OS can't publish the *user activities*.
+- 1 – (default) Enabled. Apps/OS can publish the *user activities*.
+
@@ -2545,6 +2620,7 @@ Footnote:
## Privacy policies supported by Microsoft Surface Hub
+- [Privacy/EnableActivityFeed](#privacy-enableactivityfeed)
- [Privacy/LetAppsGetDiagnosticInfo](#privacy-letappsgetdiagnosticinfo)
- [Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps](#privacy-letappsgetdiagnosticinfo-forceallowtheseapps)
- [Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps](#privacy-letappsgetdiagnosticinfo-forcedenytheseapps)
@@ -2553,5 +2629,6 @@ Footnote:
- [Privacy/LetAppsRunInBackground_ForceAllowTheseApps](#privacy-letappsruninbackground-forceallowtheseapps)
- [Privacy/LetAppsRunInBackground_ForceDenyTheseApps](#privacy-letappsruninbackground-forcedenytheseapps)
- [Privacy/LetAppsRunInBackground_UserInControlOfTheseApps](#privacy-letappsruninbackground-userincontroloftheseapps)
+- [Privacy/PublishUserActivities](#privacy-publishuseractivities)
diff --git a/windows/client-management/mdm/policy-csp-remoteassistance.md b/windows/client-management/mdm/policy-csp-remoteassistance.md
index 0f082798fe..61751bca3b 100644
--- a/windows/client-management/mdm/policy-csp-remoteassistance.md
+++ b/windows/client-management/mdm/policy-csp-remoteassistance.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - RemoteAssistance
@@ -68,8 +68,9 @@ If you do not configure this policy setting, the user sees the default warning m
ADMX Info:
-- GP english name: *Customize warning messages*
+- GP English name: *Customize warning messages*
- GP name: *RA_Options*
+- GP path: *System/Remote Assistance*
- GP ADMX file name: *remoteassistance.admx*
@@ -119,8 +120,9 @@ If you do not configure this setting, application-based settings are used.
ADMX Info:
-- GP english name: *Turn on session logging*
+- GP English name: *Turn on session logging*
- GP name: *RA_Logging*
+- GP path: *System/Remote Assistance*
- GP ADMX file name: *remoteassistance.admx*
@@ -178,8 +180,9 @@ If you enable this policy setting you should also enable appropriate firewall ex
ADMX Info:
-- GP english name: *Configure Solicited Remote Assistance*
+- GP English name: *Configure Solicited Remote Assistance*
- GP name: *RA_Solicit*
+- GP path: *System/Remote Assistance*
- GP ADMX file name: *remoteassistance.admx*
@@ -260,8 +263,9 @@ Allow Remote Desktop Exception
ADMX Info:
-- GP english name: *Configure Offer Remote Assistance*
+- GP English name: *Configure Offer Remote Assistance*
- GP name: *RA_Unsolicit*
+- GP path: *System/Remote Assistance*
- GP ADMX file name: *remoteassistance.admx*
diff --git a/windows/client-management/mdm/policy-csp-remotedesktopservices.md b/windows/client-management/mdm/policy-csp-remotedesktopservices.md
index 57e8b93015..411214069f 100644
--- a/windows/client-management/mdm/policy-csp-remotedesktopservices.md
+++ b/windows/client-management/mdm/policy-csp-remotedesktopservices.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - RemoteDesktopServices
@@ -68,8 +68,9 @@ You can limit the number of users who can connect simultaneously by configuring
ADMX Info:
-- GP english name: *Allow users to connect remotely by using Remote Desktop Services*
+- GP English name: *Allow users to connect remotely by using Remote Desktop Services*
- GP name: *TS_DISABLE_CONNECTIONS*
+- GP path: *Windows Components/Remote Desktop Services/Remote Desktop Session Host/Connections*
- GP ADMX file name: *terminalserver.admx*
@@ -127,8 +128,9 @@ FIPS compliance can be configured through the System cryptography. Use FIPS comp
ADMX Info:
-- GP english name: *Set client connection encryption level*
+- GP English name: *Set client connection encryption level*
- GP name: *TS_ENCRYPTION_POLICY*
+- GP path: *Windows Components/Remote Desktop Services/Remote Desktop Session Host/Security*
- GP ADMX file name: *terminalserver.admx*
@@ -180,8 +182,9 @@ If you do not configure this policy setting, client drive redirection and Clipbo
ADMX Info:
-- GP english name: *Do not allow drive redirection*
+- GP English name: *Do not allow drive redirection*
- GP name: *TS_CLIENT_DRIVE_M*
+- GP path: *Windows Components/Remote Desktop Services/Remote Desktop Session Host/Device and Resource Redirection*
- GP ADMX file name: *terminalserver.admx*
@@ -229,8 +232,9 @@ If you disable this setting or leave it not configured, the user will be able to
ADMX Info:
-- GP english name: *Do not allow passwords to be saved*
+- GP English name: *Do not allow passwords to be saved*
- GP name: *TS_CLIENT_DISABLE_PASSWORD_SAVING_2*
+- GP path: *Windows Components/Remote Desktop Services/Remote Desktop Connection Client*
- GP ADMX file name: *terminalserver.admx*
@@ -284,8 +288,9 @@ If you do not configure this policy setting, automatic logon is not specified at
ADMX Info:
-- GP english name: *Always prompt for password upon connection*
+- GP English name: *Always prompt for password upon connection*
- GP name: *TS_PASSWORD*
+- GP path: *Windows Components/Remote Desktop Services/Remote Desktop Session Host/Security*
- GP ADMX file name: *terminalserver.admx*
@@ -339,8 +344,9 @@ Note: The RPC interface is used for administering and configuring Remote Desktop
ADMX Info:
-- GP english name: *Require secure RPC communication*
+- GP English name: *Require secure RPC communication*
- GP name: *TS_RPC_ENCRYPTION*
+- GP path: *Windows Components/Remote Desktop Services/Remote Desktop Session Host/Security*
- GP ADMX file name: *terminalserver.admx*
diff --git a/windows/client-management/mdm/policy-csp-remotemanagement.md b/windows/client-management/mdm/policy-csp-remotemanagement.md
index 2bb1892add..d084b5d609 100644
--- a/windows/client-management/mdm/policy-csp-remotemanagement.md
+++ b/windows/client-management/mdm/policy-csp-remotemanagement.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - RemoteManagement
@@ -56,8 +56,9 @@ ms.date: 07/14/2017
ADMX Info:
-- GP english name: *Allow Basic authentication*
+- GP English name: *Allow Basic authentication*
- GP name: *AllowBasic_2*
+- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Client*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -99,8 +100,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow Basic authentication*
+- GP English name: *Allow Basic authentication*
- GP name: *AllowBasic_1*
+- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -142,8 +144,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow CredSSP authentication*
+- GP English name: *Allow CredSSP authentication*
- GP name: *AllowCredSSP_2*
+- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Client*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -185,8 +188,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow CredSSP authentication*
+- GP English name: *Allow CredSSP authentication*
- GP name: *AllowCredSSP_1*
+- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -228,8 +232,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow remote server management through WinRM*
+- GP English name: *Allow remote server management through WinRM*
- GP name: *AllowAutoConfig*
+- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -271,8 +276,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow unencrypted traffic*
+- GP English name: *Allow unencrypted traffic*
- GP name: *AllowUnencrypted_2*
+- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Client*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -314,8 +320,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Allow unencrypted traffic*
+- GP English name: *Allow unencrypted traffic*
- GP name: *AllowUnencrypted_1*
+- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -357,8 +364,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Disallow Digest authentication*
+- GP English name: *Disallow Digest authentication*
- GP name: *DisallowDigest*
+- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Client*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -400,8 +408,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Disallow Negotiate authentication*
+- GP English name: *Disallow Negotiate authentication*
- GP name: *DisallowNegotiate_2*
+- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Client*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -443,8 +452,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Disallow Negotiate authentication*
+- GP English name: *Disallow Negotiate authentication*
- GP name: *DisallowNegotiate_1*
+- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -486,8 +496,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Disallow WinRM from storing RunAs credentials*
+- GP English name: *Disallow WinRM from storing RunAs credentials*
- GP name: *DisableRunAs*
+- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -529,8 +540,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Specify channel binding token hardening level*
+- GP English name: *Specify channel binding token hardening level*
- GP name: *CBTHardeningLevel_1*
+- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -572,8 +584,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Trusted Hosts*
+- GP English name: *Trusted Hosts*
- GP name: *TrustedHosts*
+- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Client*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -615,8 +628,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Turn On Compatibility HTTP Listener*
+- GP English name: *Turn On Compatibility HTTP Listener*
- GP name: *HttpCompatibilityListener*
+- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -658,8 +672,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Turn On Compatibility HTTPS Listener*
+- GP English name: *Turn On Compatibility HTTPS Listener*
- GP name: *HttpsCompatibilityListener*
+- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service*
- GP ADMX file name: *WindowsRemoteManagement.admx*
diff --git a/windows/client-management/mdm/policy-csp-remoteprocedurecall.md b/windows/client-management/mdm/policy-csp-remoteprocedurecall.md
index 79559fed08..dc1dab2c86 100644
--- a/windows/client-management/mdm/policy-csp-remoteprocedurecall.md
+++ b/windows/client-management/mdm/policy-csp-remoteprocedurecall.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - RemoteProcedureCall
@@ -66,8 +66,9 @@ Note: This policy will not be applied until the system is rebooted.
ADMX Info:
-- GP english name: *Enable RPC Endpoint Mapper Client Authentication*
+- GP English name: *Enable RPC Endpoint Mapper Client Authentication*
- GP name: *RpcEnableAuthEpResolution*
+- GP path: *System/Remote Procedure Call*
- GP ADMX file name: *rpc.admx*
@@ -127,8 +128,9 @@ Note: This policy setting will not be applied until the system is rebooted.
ADMX Info:
-- GP english name: *Restrict Unauthenticated RPC clients*
+- GP English name: *Restrict Unauthenticated RPC clients*
- GP name: *RpcRestrictRemoteClients*
+- GP path: *System/Remote Procedure Call*
- GP ADMX file name: *rpc.admx*
diff --git a/windows/client-management/mdm/policy-csp-remoteshell.md b/windows/client-management/mdm/policy-csp-remoteshell.md
index becd1b6df2..32309bdf9d 100644
--- a/windows/client-management/mdm/policy-csp-remoteshell.md
+++ b/windows/client-management/mdm/policy-csp-remoteshell.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - RemoteShell
@@ -56,8 +56,9 @@ ms.date: 07/14/2017
ADMX Info:
-- GP english name: *Allow Remote Shell Access*
+- GP English name: *Allow Remote Shell Access*
- GP name: *AllowRemoteShellAccess*
+- GP path: *Windows Components/Windows Remote Shell*
- GP ADMX file name: *WindowsRemoteShell.admx*
@@ -99,8 +100,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *MaxConcurrentUsers*
+- GP English name: *MaxConcurrentUsers*
- GP name: *MaxConcurrentUsers*
+- GP path: *Windows Components/Windows Remote Shell*
- GP ADMX file name: *WindowsRemoteShell.admx*
@@ -142,8 +144,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Specify idle Timeout*
+- GP English name: *Specify idle Timeout*
- GP name: *IdleTimeout*
+- GP path: *Windows Components/Windows Remote Shell*
- GP ADMX file name: *WindowsRemoteShell.admx*
@@ -185,8 +188,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Specify maximum amount of memory in MB per Shell*
+- GP English name: *Specify maximum amount of memory in MB per Shell*
- GP name: *MaxMemoryPerShellMB*
+- GP path: *Windows Components/Windows Remote Shell*
- GP ADMX file name: *WindowsRemoteShell.admx*
@@ -228,8 +232,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Specify maximum number of processes per Shell*
+- GP English name: *Specify maximum number of processes per Shell*
- GP name: *MaxProcessesPerShell*
+- GP path: *Windows Components/Windows Remote Shell*
- GP ADMX file name: *WindowsRemoteShell.admx*
@@ -271,8 +276,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Specify maximum number of remote shells per user*
+- GP English name: *Specify maximum number of remote shells per user*
- GP name: *MaxShellsPerUser*
+- GP path: *Windows Components/Windows Remote Shell*
- GP ADMX file name: *WindowsRemoteShell.admx*
@@ -314,8 +320,9 @@ ADMX Info:
ADMX Info:
-- GP english name: *Specify Shell Timeout*
+- GP English name: *Specify Shell Timeout*
- GP name: *ShellTimeOut*
+- GP path: *Windows Components/Windows Remote Shell*
- GP ADMX file name: *WindowsRemoteShell.admx*
diff --git a/windows/client-management/mdm/policy-csp-search.md b/windows/client-management/mdm/policy-csp-search.md
index b4338ee741..783aac1e8d 100644
--- a/windows/client-management/mdm/policy-csp-search.md
+++ b/windows/client-management/mdm/policy-csp-search.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Search
@@ -19,6 +19,42 @@ ms.date: 07/14/2017
## Search policies
+
+**Search/AllowCloudSearch**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+
+
+
+
+
+Added in Windows 10, version 1709. Allow search and Cortana to search cloud sources like OneDrive and SharePoint. This policy allows corporate administrators to control whether employees can turn off/on the search of these cloud sources. The default policy value is to allow employees access to the setting that controls search of cloud sources.
+
+ The following list shows the supported values:
+
+- 0 – Not allowed.
+- 1 (default) – Allowed.
+
+
+
**Search/AllowIndexingEncryptedStoresOrItems**
diff --git a/windows/client-management/mdm/policy-csp-security.md b/windows/client-management/mdm/policy-csp-security.md
index 5b0f36a599..229903014f 100644
--- a/windows/client-management/mdm/policy-csp-security.md
+++ b/windows/client-management/mdm/policy-csp-security.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/26/2017
+ms.date: 08/30/2017
---
# Policy CSP - Security
@@ -216,6 +216,45 @@ ms.date: 07/26/2017
- 0 – Don't allow Anti Theft Mode.
- 1 (default) – Anti Theft Mode will follow the default device configuration (region-dependent).
+
+
+
+**Security/ClearTPMIfNotReady**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+ |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+> [!NOTE]
+> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile.
+
+Added in Windows 10, version 1709. Admin access is required. The prompt will appear on first admin logon after a reboot when the TPM is in a non-ready state that can be remediated with a TPM Clear. The prompt will have a description of what clearing the TPM does and that it requires a reboot. The user can dismiss it, but it will appear on next admin logon after restart.
+
+The following list shows the supported values:
+
+- 0 (default) – Will not force recovery from a non-ready TPM state.
+- 1 – Will prompt to clear the TPM if the TPM is in a non-ready state (or reduced functionality) which can be remediated with a TPM Clear.
+
@@ -258,45 +297,6 @@ ms.date: 07/26/2017
- 0 (default) – Encryption enabled.
- 1 – Encryption disabled.
-
-
-
-**Security/ClearTPMIfNotReady**
-
-
-
-
- Home |
- Pro |
- Business |
- Enterprise |
- Education |
- Mobile |
- Mobile Enterprise |
-
-
- |
- 3 |
- 3 |
- 3 |
- 3 |
-  |
-  |
-
-
-
-
-
-> [!NOTE]
-> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile.
-
-Added in Windows 10, version 1709. Admin access is required. The prompt will appear on first admin logon after a reboot when the TPM is in a non-ready state that can be remediated with a TPM Clear. The prompt will have a description of what clearing the TPM does and that it requires a reboot. The user can dismiss it, but it will appear on next admin logon after restart.
-
-The following list shows the supported values:
-
-- 0 (default) – Will not force recovery from a non-ready TPM state.
-- 1 – Will prompt to clear the TPM if the TPM is in a non-ready state (or reduced functionality) which can be remediated with a TPM Clear.
-
diff --git a/windows/client-management/mdm/policy-csp-settings.md b/windows/client-management/mdm/policy-csp-settings.md
index 1f0609cf32..50a3295347 100644
--- a/windows/client-management/mdm/policy-csp-settings.md
+++ b/windows/client-management/mdm/policy-csp-settings.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Settings
diff --git a/windows/client-management/mdm/policy-csp-smartscreen.md b/windows/client-management/mdm/policy-csp-smartscreen.md
index f051f86853..adc515f986 100644
--- a/windows/client-management/mdm/policy-csp-smartscreen.md
+++ b/windows/client-management/mdm/policy-csp-smartscreen.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - SmartScreen
diff --git a/windows/client-management/mdm/policy-csp-speech.md b/windows/client-management/mdm/policy-csp-speech.md
index e19e02b135..833057f11a 100644
--- a/windows/client-management/mdm/policy-csp-speech.md
+++ b/windows/client-management/mdm/policy-csp-speech.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Speech
diff --git a/windows/client-management/mdm/policy-csp-start.md b/windows/client-management/mdm/policy-csp-start.md
index 63e49d9fa5..75e90f86a0 100644
--- a/windows/client-management/mdm/policy-csp-start.md
+++ b/windows/client-management/mdm/policy-csp-start.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Start
@@ -448,10 +448,10 @@ ms.date: 07/14/2017
 |
- 2 |
+ 3 |
|
- 2 |
- 2 |
+ 3 |
+ 3 |
 |
 |
@@ -462,7 +462,10 @@ ms.date: 07/14/2017
> [!NOTE]
> This policy requires reboot to take effect.
-Added in Windows 10, version 1703. Allows IT Admins to configure Start by collapsing or removing the all apps list.
+ Allows IT Admins to configure Start by collapsing or removing the all apps list.
+
+> [!Note]
+> There were issues reported with the previous release of this policy and a fix was added in Windows 10, version 1709.
The following list shows the supported values:
diff --git a/windows/client-management/mdm/policy-csp-storage.md b/windows/client-management/mdm/policy-csp-storage.md
index 6e7bf5238a..e73be79d8b 100644
--- a/windows/client-management/mdm/policy-csp-storage.md
+++ b/windows/client-management/mdm/policy-csp-storage.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Storage
@@ -62,8 +62,9 @@ If you disable or do not configure this policy setting, Windows will activate un
ADMX Info:
-- GP english name: *Do not allow Windows to activate Enhanced Storage devices*
+- GP English name: *Do not allow Windows to activate Enhanced Storage devices*
- GP name: *TCGSecurityActivationDisabled*
+- GP path: *System/Enhanced Storage Access*
- GP ADMX file name: *enhancedstorage.admx*
diff --git a/windows/client-management/mdm/policy-csp-system.md b/windows/client-management/mdm/policy-csp-system.md
index ac2270f86c..d077ea3454 100644
--- a/windows/client-management/mdm/policy-csp-system.md
+++ b/windows/client-management/mdm/policy-csp-system.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - System
@@ -546,13 +546,59 @@ Also, see the "Turn off System Restore configuration" policy setting. If the "Tu
ADMX Info:
-- GP english name: *Turn off System Restore*
+- GP English name: *Turn off System Restore*
- GP name: *SR_DisableSR*
+- GP path: *System/System Restore*
- GP ADMX file name: *systemrestore.admx*
+**System/LimitEnhancedDiagnosticDataWindowsAnalytics**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+
+
+
+
+
+This policy setting, in combination with the System/AllowTelemetry
+ policy setting, enables organizations to send Microsoft a specific set of diagnostic data for IT insights via Windows Analytics services.
+
+ To enable this behavior you must complete two steps:
+
+- Enable this policy setting
+- Set Allow Telemetry to level 2 (Enhanced)
+
+
+When you configure these policy settings, a basic level of diagnostic data plus additional events that are required for Windows Analytics are sent to Microsoft. These events are documented here: [Windows 10, version 1703 basic level Windows diagnostic events and fields](https://go.microsoft.com/fwlink/?linkid=847594).
+
+ Enabling enhanced diagnostic data in the System/AllowTelemetry policy in combination with not configuring this policy will also send the required events for Windows Analytics, plus additional enhanced level telemetry data. This setting has no effect on computers configured to send full, basic or security level diagnostic data to Microsoft.
+
+ If you disable or do not configure this policy setting, then the level of diagnostic data sent to Microsoft is determined by the System/AllowTelemetry policy.
+
+
+
+
+
**System/TelemetryProxy**
diff --git a/windows/client-management/mdm/policy-csp-textinput.md b/windows/client-management/mdm/policy-csp-textinput.md
index a301e620e4..08041394b9 100644
--- a/windows/client-management/mdm/policy-csp-textinput.md
+++ b/windows/client-management/mdm/policy-csp-textinput.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - TextInput
@@ -363,29 +363,6 @@ ms.date: 07/14/2017
**TextInput/AllowKoreanExtendedHanja**
-
-
-
- Home |
- Pro |
- Business |
- Enterprise |
- Education |
- Mobile |
- Mobile Enterprise |
-
-
-  |
- 2 |
- 2 |
- 2 |
- 2 |
-  |
-  |
-
-
-
-
This policy has been deprecated.
diff --git a/windows/client-management/mdm/policy-csp-timelanguagesettings.md b/windows/client-management/mdm/policy-csp-timelanguagesettings.md
index 5aa7ed1720..5eba1aac1c 100644
--- a/windows/client-management/mdm/policy-csp-timelanguagesettings.md
+++ b/windows/client-management/mdm/policy-csp-timelanguagesettings.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - TimeLanguageSettings
diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md
index 3681d55d6f..e3a796b41d 100644
--- a/windows/client-management/mdm/policy-csp-update.md
+++ b/windows/client-management/mdm/policy-csp-update.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Update
@@ -46,10 +46,6 @@ ms.date: 07/14/2017
-> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise
-
-
Added in Windows 10, version 1607. Allows the IT admin (when used with **Update/ActiveHoursStart**) to manage a range of active hours where update reboots are not scheduled. This value sets the end time. There is a 12 hour maximum from start time.
> [!NOTE]
@@ -88,10 +84,6 @@ ms.date: 07/14/2017
-> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise
-
-
Added in Windows 10, version 1703. Allows the IT admin to specify the max active hours range. This value sets max number of active hours from start time.
Supported values are 8-18.
@@ -127,10 +119,6 @@ ms.date: 07/14/2017
-> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise
-
-
Added in Windows 10, version 1607. Allows the IT admin (when used with **Update/ActiveHoursEnd**) to manage a range of hours where update reboots are not scheduled. This value sets the start time. There is a 12 hour maximum from end time.
> [!NOTE]
@@ -169,10 +157,6 @@ ms.date: 07/14/2017
-> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise
-
-
Enables the IT admin to manage automatic update behavior to scan, download, and install updates.
Supported operations are Get and Replace.
@@ -192,6 +176,43 @@ ms.date: 07/14/2017
If the policy is not configured, end-users get the default behavior (Auto install and restart).
+
+
+
+**Update/AllowAutoWindowsUpdateDownloadOverMeteredNetwork**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+Added in Windows 10, version 1709. Option to download updates automatically over metered connections (off by default). Value type is integer.
+
+- 0 (default) - Not allowed
+- 1 - Allowed
+
+A significant number of devices primarily use cellular data and do not have Wi-Fi access, which leads to a lower number of devices getting updates. Since a large number of devices have large data plans or unlimited data, this policy can unblock devices from getting updates.
+
+This policy is accessible through the Update setting in the user interface or Group Policy.
@@ -221,10 +242,6 @@ ms.date: 07/14/2017
-> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education
-
-
Added in Windows 10, version 1607. Allows the IT admin to manage whether to scan for app updates from Microsoft Update.
The following list shows the supported values:
@@ -261,10 +278,6 @@ ms.date: 07/14/2017
-> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise
-
-
Allows the IT admin to manage whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found at the UpdateServiceUrl location. This policy supports using WSUS for 3rd party software and patch distribution.
Supported operations are Get and Replace.
@@ -305,10 +318,6 @@ ms.date: 07/14/2017
-> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise
-
-
Specifies whether the device could use Microsoft Update, Windows Server Update Services (WSUS), or Windows Store.
Even when Windows Update is configured to receive updates from an intranet update service, it will periodically retrieve information from the public Windows Update service to enable future connections to Windows Update, and other services like Microsoft Update or the Windows Store
@@ -387,10 +396,6 @@ ms.date: 07/14/2017
-> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise
-
-
Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart reminder notifications.
Supported values are 15, 30, 60, 120, and 240 (minutes).
@@ -426,10 +431,6 @@ ms.date: 07/14/2017
-> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise
-
-
Added in Windows 10, version 1703. Allows the IT Admin to specify the method by which the auto-restart required notification is dismissed.
The following list shows the supported values:
@@ -466,10 +467,6 @@ ms.date: 07/14/2017
-> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise
-
-
Added in Windows 10, version 1607. Allows the IT admin to set which branch a device receives their updates from.
The following list shows the supported values:
@@ -506,8 +503,6 @@ ms.date: 07/14/2017
-> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education.
Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect.
Added in Windows 10, version 1607. Defers Feature Updates for the specified number of days.
@@ -546,10 +541,6 @@ ms.date: 07/14/2017
-> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise
-
-
Added in Windows 10, version 1607. Defers Quality Updates for the specified number of days.
Supported values are 0-30.
@@ -584,8 +575,6 @@ ms.date: 07/14/2017
> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise
->
> Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use DeferUpdatePeriod for Windows 10, version 1511 devices.
@@ -683,8 +672,6 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education.
->
> Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect.
>
> Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use DeferUpgradePeriod for Windows 10, version 1511 devices.
@@ -729,6 +716,46 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
Added in Windows 10, version 1703. Specifies the scan frequency from every 1 - 22 hours. Default is 22 hours.
+
+
+
+**Update/DisableDualScan**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 3 |
+ 3 |
+ 3 |
+ 3 |
+  |
+  |
+
+
+
+
+
+Added in Windows 10, version 1709, but was added to 1607 and 1703 service releases. Do not allow update deferral policies to cause scans against Windows Update. If this policy is not enabled, then configuring deferral policies will result in the client unexpectedly scanning Windows update. With the policy enabled, those scans are prevented, and users can configure deferral policies as much as they like.
+
+ For more information about dual scan, see [Demystifying "Dual Scan"](https://blogs.technet.microsoft.com/wsus/2017/05/05/demystifying-dual-scan/) and [Improving Dual Scan on 1607](https://blogs.technet.microsoft.com/wsus/2017/08/04/improving-dual-scan-on-1607/).
+
+- 0 - allow scan against Windows Update
+- 1 - do not allow update deferral policies to cause scans against Windows Update
+
+ This is the same as the Group Policy in Windows Components > Window Update "Do not allow update deferral policies to cause scans against Windows Update."
+
+ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
+
@@ -758,10 +785,6 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
-> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise
-
-
Added in Windows 10, version 1703. Allows the IT Admin to specify the deadline in days before automatically scheduling and executing a pending restart outside of active hours. The deadline can be set between 2 and 30 days from the time the restart becomes pending. If configured, the pending restart will transition from Auto-restart to Engaged restart (pending user schedule) to be automatically executed within the specified period. If no deadline is specified or deadline is set to 0, the restart will not be automatically executed and will remain Engaged restart (pending user scheduling).
Supported values are 2-30 days.
@@ -797,10 +820,6 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
-> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise
-
-
Added in Windows 10, version 1703. Allows the IT Admin to control the number of days a user can snooze Engaged restart reminder notifications.
Supported values are 1-3 days.
@@ -836,10 +855,6 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
-> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise
-
-
Added in Windows 10, version 1703. Allows the IT Admin to control the timing before transitioning from Auto restarts scheduled outside of active hours to Engaged restart, which requires the user to schedule. The period can be set between 2 and 30 days from the time the restart becomes pending.
Supported values are 2-30 days.
@@ -876,7 +891,6 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education.
> Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect.
Added in Windows 10, version 1607. Allows IT Admins to exclude Windows Update (WU) drivers during updates.
@@ -1051,8 +1065,6 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise
->
> Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use PauseDeferrals for Windows 10, version 1511 devices.
@@ -1096,8 +1108,6 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
-> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education.
Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect.
@@ -1170,9 +1180,6 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
-> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise
-
Added in Windows 10, version 1607. Allows IT Admins to pause Quality Updates.
The following list shows the supported values:
@@ -1243,8 +1250,6 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise
->
> Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use RequireDeferUpgrade for Windows 10, version 1511 devices.
@@ -1284,11 +1289,6 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
-> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise
-
-
-
> [!NOTE]
> If you previously used the **Update/PhoneUpdateRestrictions** policy in previous versions of Windows, it has been deprecated. Please use this policy instead.
@@ -1331,10 +1331,6 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
-> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise
-
-
Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart imminent warning notifications.
Supported values are 15, 30, or 60 (minutes).
@@ -1409,10 +1405,6 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
-> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise
-
-
Enables the IT admin to schedule the day of the update installation.
The data type is a integer.
@@ -1677,10 +1669,6 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
-> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise
-
-
Added in Windows 10, version 1703. Allows the IT Admin to disable auto-restart notifications for update installations.
The following list shows the supported values:
@@ -1753,9 +1741,6 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
-> [!NOTE]
-> This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise
-
> [!Important]
> Starting in Windows 10, version 1703 this policy is not supported in Windows 10 Mobile Enteprise and IoT Mobile.
@@ -1815,8 +1800,6 @@ Example
-> **Note** This policy is available on Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education.
-
Added in the January service release of Windows 10, version 1607. Specifies an alternate intranet server to host updates from Microsoft Update. You can then use this update service to automatically update computers on your network.
This setting lets you specify a server on your network to function as an internal update service. The Automatic Updates client will search this service for updates that apply to the computers on your network.
diff --git a/windows/client-management/mdm/policy-csp-wifi.md b/windows/client-management/mdm/policy-csp-wifi.md
index 14181da459..7d019f9c35 100644
--- a/windows/client-management/mdm/policy-csp-wifi.md
+++ b/windows/client-management/mdm/policy-csp-wifi.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - Wifi
@@ -22,29 +22,6 @@ ms.date: 07/14/2017
**WiFi/AllowWiFiHotSpotReporting**
-
-
-
- Home |
- Pro |
- Business |
- Enterprise |
- Education |
- Mobile |
- Mobile Enterprise |
-
-
-  |
- 1 |
- |
- 1 |
- 1 |
-  |
-  |
-
-
-
-
This policy has been deprecated.
diff --git a/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md b/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md
index 1562806a3e..ba85960f84 100644
--- a/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md
+++ b/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - WindowsDefenderSecurityCenter
diff --git a/windows/client-management/mdm/policy-csp-windowsinkworkspace.md b/windows/client-management/mdm/policy-csp-windowsinkworkspace.md
index aea0a2de88..32d34d88ec 100644
--- a/windows/client-management/mdm/policy-csp-windowsinkworkspace.md
+++ b/windows/client-management/mdm/policy-csp-windowsinkworkspace.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - WindowsInkWorkspace
diff --git a/windows/client-management/mdm/policy-csp-windowslogon.md b/windows/client-management/mdm/policy-csp-windowslogon.md
index c0d3fb1bdc..22b96181e5 100644
--- a/windows/client-management/mdm/policy-csp-windowslogon.md
+++ b/windows/client-management/mdm/policy-csp-windowslogon.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - WindowsLogon
@@ -62,8 +62,9 @@ If you disable or do not configure this policy setting, users can choose which a
ADMX Info:
-- GP english name: *Turn off app notifications on the lock screen*
+- GP English name: *Turn off app notifications on the lock screen*
- GP name: *DisableLockScreenAppNotifications*
+- GP path: *System/Logon*
- GP ADMX file name: *logon.admx*
@@ -111,8 +112,9 @@ If you disable or don't configure this policy setting, any user can disconnect t
ADMX Info:
-- GP english name: *Do not display network selection UI*
+- GP English name: *Do not display network selection UI*
- GP name: *DontDisplayNetworkSelectionUI*
+- GP path: *System/Logon*
- GP ADMX file name: *logon.admx*
diff --git a/windows/client-management/mdm/policy-csp-wirelessdisplay.md b/windows/client-management/mdm/policy-csp-wirelessdisplay.md
index 535bc242b7..ea09c4b3c7 100644
--- a/windows/client-management/mdm/policy-csp-wirelessdisplay.md
+++ b/windows/client-management/mdm/policy-csp-wirelessdisplay.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 07/14/2017
+ms.date: 08/30/2017
---
# Policy CSP - WirelessDisplay
@@ -162,29 +162,6 @@ ms.date: 07/14/2017
**WirelessDisplay/AllowUserInputFromWirelessDisplayReceiver**
-
-
-
- Home |
- Pro |
- Business |
- Enterprise |
- Education |
- Mobile |
- Mobile Enterprise |
-
-
-  |
- 2 |
- 2 |
- 2 |
- 2 |
- 2 |
- 2 |
-
-
-
-
Added in Windows 10, version 1703.
diff --git a/windows/client-management/mdm/policy-ddf-file.md b/windows/client-management/mdm/policy-ddf-file.md
index ec16e08ca7..3e242783d4 100644
--- a/windows/client-management/mdm/policy-ddf-file.md
+++ b/windows/client-management/mdm/policy-ddf-file.md
@@ -7,7 +7,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 06/30/2017
+ms.date: 08/23/2017
---
# Policy DDF file
@@ -21,6 +21,7 @@ You can download the DDF files from the links below:
- [Download the Policy DDF file for Windows 10, version 1703](http://download.microsoft.com/download/7/2/C/72C36C37-20F9-41BF-8E23-721F6FFC253E/PolicyDDF_all.xml)
- [Download the Policy DDF file for Windows 10, version 1607](http://download.microsoft.com/download/6/1/C/61C022FD-6F5D-4F73-9047-17F630899DC4/PolicyDDF_all_version1607.xml)
+- [Download the Policy DDF file for Windows 10, version 1607 release 8C](http://download.microsoft.com/download/6/1/C/61C022FD-6F5D-4F73-9047-17F630899DC4/PolicyDDF_all_version1607_8C.xml)
- [Download all the DDF files for Windows 10, version 1607](http://download.microsoft.com/download/2/3/E/23E27D6B-6E23-4833-B143-915EDA3BDD44/Windows10_1607_DDF.zip)
The XML below is the DDF for Windows 10, version 1709.
@@ -353,6 +354,941 @@ The XML below is the DDF for Windows 10, version 1709.
+
+ Browser
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ AllowAddressBarDropdown
+
+
+
+
+
+
+
+ This policy setting lets you decide whether the Address bar drop-down functionality is available in Microsoft Edge. We recommend disabling this setting if you want to minimize network connections from Microsoft Edge to Microsoft services.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AllowAutofill
+
+
+
+
+
+
+
+ This setting lets you decide whether employees can use Autofill to automatically fill in form fields while using Microsoft Edge.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AllowBrowser
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AllowCookies
+
+
+
+
+
+
+
+ This setting lets you configure how your company deals with cookies.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AllowDeveloperTools
+
+
+
+
+
+
+
+ This setting lets you decide whether employees can use F12 Developer Tools on Microsoft Edge.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AllowDoNotTrack
+
+
+
+
+
+
+
+ This setting lets you decide whether employees can send Do Not Track headers to websites that request tracking info.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AllowExtensions
+
+
+
+
+
+
+
+ This setting lets you decide whether employees can load extensions in Microsoft Edge.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AllowFlash
+
+
+
+
+
+
+
+ This setting lets you decide whether employees can run Adobe Flash in Microsoft Edge.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AllowFlashClickToRun
+
+
+
+
+
+
+
+ Configure the Adobe Flash Click-to-Run setting.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AllowInPrivate
+
+
+
+
+
+
+
+ This setting lets you decide whether employees can browse using InPrivate website browsing.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AllowMicrosoftCompatibilityList
+
+
+
+
+
+
+
+ This policy setting lets you decide whether the Microsoft Compatibility List is enabled or disabled in Microsoft Edge. This feature uses a Microsoft-provided list to ensure that any sites with known compatibility issues are displayed correctly when a user navigates to them. By default, the Microsoft Compatibility List is enabled and can be viewed by navigating to about:compat.
+
+If you enable or don’t configure this setting, Microsoft Edge will periodically download the latest version of the list from Microsoft and will apply the configurations specified there during browser navigation. If a user visits a site on the Microsoft Compatibility List, he or she will be prompted to open the site in Internet Explorer 11. Once in Internet Explorer, the site will automatically be rendered as if the user is viewing it in the previous version of Internet Explorer it requires to display correctly.
+
+If you disable this setting, the Microsoft Compatibility List will not be used during browser navigation.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AllowPasswordManager
+
+
+
+
+
+
+
+ This setting lets you decide whether employees can save their passwords locally, using Password Manager.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AllowPopups
+
+
+
+
+
+
+
+ This setting lets you decide whether to turn on Pop-up Blocker and whether to allow pop-ups to appear in secondary windows.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AllowSearchEngineCustomization
+
+
+
+
+
+
+
+ Allow search engine customization for MDM enrolled devices. Users can change their default search engine.
+
+If this setting is turned on or not configured, users can add new search engines and change the default used in the address bar from within Microsoft Edge Settings.
+If this setting is disabled, users will be unable to add search engines or change the default used in the address bar.
+
+This policy will only apply on domain joined machines or when the device is MDM enrolled. For more information, see Microsoft browser extension policy (aka.ms/browserpolicy).
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AllowSearchSuggestionsinAddressBar
+
+
+
+
+
+
+
+ This setting lets you decide whether search suggestions should appear in the Address bar of Microsoft Edge.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AllowSmartScreen
+
+
+
+
+
+
+
+ This setting lets you decide whether to turn on Windows Defender SmartScreen.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AlwaysEnableBooksLibrary
+
+
+
+
+
+
+
+ Specifies whether the Books Library in Microsoft Edge will always be visible regardless of the country or region setting for the device.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ ClearBrowsingDataOnExit
+
+
+
+
+
+
+
+ Specifies whether to always clear browsing history on exiting Microsoft Edge.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ ConfigureAdditionalSearchEngines
+
+
+
+
+
+
+
+ Allows you to add up to 5 additional search engines for MDM-enrolled devices.
+
+If this setting is turned on, you can add up to 5 additional search engines for your employee. For each additional search engine you wish to add, you must specify a link to the OpenSearch XML file that contains, at minimum, the short name and the URL to the search engine. This policy does not affect the default search engine. Employees will not be able to remove these search engines, but they can set any one of these as the default.
+
+If this setting is not configured, the search engines are the ones specified in the App settings. If this setting is disabled, the search engines you had added will be deleted from your employee's machine.
+
+Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on domain-joined machines or when the device is MDM-enrolled.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ DisableLockdownOfStartPages
+
+
+
+
+
+
+
+ Boolean policy that specifies whether the lockdown on the Start pages is disabled. This policy works with the Browser/HomePages policy, which locks down the Start pages that the users cannot modify. You can use the DisableLockdownOfStartPages policy to allow users to modify the Start pages when Browser/HomePages policy is in effect.
+
+Note: This policy has no effect when Browser/HomePages is not configured.
+
+Important
+This setting can only be used with domain-joined or MDM-enrolled devices. For more info, see the Microsoft browser extension policy (aka.ms/browserpolicy).
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ EnterpriseModeSiteList
+
+
+
+
+
+
+
+ This setting lets you configure whether your company uses Enterprise Mode and the Enterprise Mode Site List to address common compatibility problems with legacy websites.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ EnterpriseSiteListServiceUrl
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ FirstRunURL
+
+
+
+
+
+
+
+ Configure first run URL.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ HomePages
+
+
+
+
+
+
+
+ Configure the Start page URLs for your employees.
+Example:
+If you wanted to allow contoso.com and fabrikam.com then you would append /support to the site strings like contoso.com/support and fabrikam.com/support.
+Encapsulate each string with greater than and less than characters like any other XML tag.
+
+Version 1703 or later: If you don't want to send traffic to Microsoft, you can use the about:blank value (encapsulate with greater than and less than characters like any other XML tag), which is honored for both domain- and non-domain-joined machines, when it's the only configured URL.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ LockdownFavorites
+
+
+
+
+
+
+
+ This policy setting lets you decide whether employees can add, import, sort, or edit the Favorites list on Microsoft Edge.
+
+If you enable this setting, employees won't be able to add, import, or change anything in the Favorites list. Also as part of this, Save a Favorite, Import settings, and the context menu items (such as, Create a new folder) are all turned off.
+
+Important
+Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops employees from syncing their favorites between Internet Explorer and Microsoft Edge.
+
+If you disable or don't configure this setting (default), employees can add, import and make changes to the Favorites list.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ PreventAccessToAboutFlagsInMicrosoftEdge
+
+
+
+
+
+
+
+ Prevent access to the about:flags page in Microsoft Edge.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ PreventFirstRunPage
+
+
+
+
+
+
+
+ Specifies whether the First Run webpage is prevented from automatically opening on the first launch of Microsoft Edge. This policy is only available for Windows 10 version 1703 or later for desktop.
+
+Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on domain-joined machines or when the device is MDM-enrolled.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ PreventLiveTileDataCollection
+
+
+
+
+
+
+
+ This policy lets you decide whether Microsoft Edge can gather Live Tile metadata from the ieonline.microsoft.com service to provide a better experience while pinning a Live Tile to the Start menu.
+
+Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on domain-joined machines or when the device is MDM-enrolled.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ PreventSmartScreenPromptOverride
+
+
+
+
+
+
+
+ Don't allow Windows Defender SmartScreen warning overrides
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ PreventSmartScreenPromptOverrideForFiles
+
+
+
+
+
+
+
+ Don't allow Windows Defender SmartScreen warning overrides for unverified files.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ PreventUsingLocalHostIPAddressForWebRTC
+
+
+
+
+
+
+
+ Prevent using localhost IP address for WebRTC
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ ProvisionFavorites
+
+
+
+
+
+
+
+ This policy setting allows you to configure a default set of favorites, which will appear for employees. Employees cannot modify, sort, move, export or delete these provisioned favorites.
+
+If you enable this setting, you can set favorite URL's and favorite folders to appear on top of users' favorites list (either in the Hub or Favorites Bar). The user favorites will appear after these provisioned favorites.
+
+Important
+Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops employees from syncing their favorites between Internet Explorer and Microsoft Edge.
+
+If you disable or don't configure this setting, employees will see the favorites they set in the Hub and Favorites Bar.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ SendIntranetTraffictoInternetExplorer
+
+
+
+
+
+
+
+ Sends all intranet traffic over to Internet Explorer.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ SetDefaultSearchEngine
+
+
+
+
+
+
+
+ Sets the default search engine for MDM-enrolled devices. Users can still change their default search engine.
+
+If this setting is turned on, you are setting the default search engine that you would like your employees to use. Employees can still change the default search engine, unless you apply the AllowSearchEngineCustomization policy which will disable the ability to change it. You must specify a link to the OpenSearch XML file that contains, at minimum, the short name and the URL to the search engine. If you would like for your employees to use the Edge factory settings for the default search engine for their market, set the string EDGEDEFAULT; if you would like for your employees to use Bing as the default search engine, set the string EDGEBING.
+
+If this setting is not configured, the default search engine is set to the one specified in App settings and can be changed by your employees. If this setting is disabled, the policy-set search engine will be removed, and, if it is the current default, the default will be set back to the factory Microsoft Edge search engine for the market.
+
+Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on domain-joined machines or when the device is MDM-enrolled.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ ShowMessageWhenOpeningSitesInInternetExplorer
+
+
+
+
+
+
+
+ Show message when opening sites in Internet Explorer
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ SyncFavoritesBetweenIEAndMicrosoftEdge
+
+
+
+
+
+
+
+ Specifies whether favorites are kept in sync between Internet Explorer and Microsoft Edge. Changes to favorites in one browser are reflected in the other, including: additions, deletions, modifications, and ordering.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
CredentialsUI
@@ -467,7 +1403,7 @@ The XML below is the DDF for Windows 10, version 1709.
- AllowUserPrinterInstallation
+ DefaultPrinterName
@@ -475,9 +1411,9 @@ The XML below is the DDF for Windows 10, version 1709.
- Boolean that specifies whether or not to allow user to install new printers
+ This policy sets user's default printer
-
+
@@ -491,7 +1427,7 @@ The XML below is the DDF for Windows 10, version 1709.
- DefaultPrinterName
+ PreventAddingNewPrinters
@@ -499,9 +1435,9 @@ The XML below is the DDF for Windows 10, version 1709.
- This policy sets user's default printer
+ Boolean that specifies whether or not to prevent user to install new printers
-
+
@@ -1133,7 +2069,7 @@ The XML below is the DDF for Windows 10, version 1709.
- AllowInternetExplorer7PolicyList
+ AllowInternetExplorer7PolicyList
@@ -1757,7 +2693,7 @@ The XML below is the DDF for Windows 10, version 1709.
- DisableDeletingUserVisitedWebsites
+ DisableDeletingUserVisitedWebsites
@@ -2357,7 +3293,7 @@ The XML below is the DDF for Windows 10, version 1709.
- InternetZoneAllowLoadingOfXAMLFilesWRONG
+ InternetZoneAllowLoadingOfXAMLFiles
@@ -2597,31 +3533,7 @@ The XML below is the DDF for Windows 10, version 1709.
- InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG1
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
-
-
- InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG2
+ InternetZoneDoNotRunAntimalwareAgainstActiveXControls
@@ -2861,55 +3773,7 @@ The XML below is the DDF for Windows 10, version 1709.
- InternetZoneInitializeAndScriptActiveXControlsNotMarkedSafe
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
-
-
- InternetZoneJavaPermissionsWRONG1
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
-
-
- InternetZoneJavaPermissionsWRONG2
+ InternetZoneJavaPermissions
@@ -3340,6 +4204,30 @@ The XML below is the DDF for Windows 10, version 1709.
+
+ IntranetZoneDoNotRunAntimalwareAgainstActiveXControls
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
IntranetZoneInitializeAndScriptActiveXControls
@@ -3364,6 +4252,54 @@ The XML below is the DDF for Windows 10, version 1709.
+
+ IntranetZoneInitializeAndScriptActiveXControlsNotMarkedSafe
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ IntranetZoneJavaPermissions
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
IntranetZoneNavigateWindowsAndFrames
@@ -5501,31 +6437,7 @@ The XML below is the DDF for Windows 10, version 1709.
- RestrictedSitesZoneAllowFontDownloadsWRONG1
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
-
-
- RestrictedSitesZoneAllowFontDownloadsWRONG2
+ RestrictedSitesZoneAllowFontDownloads
@@ -5908,6 +6820,30 @@ The XML below is the DDF for Windows 10, version 1709.
+
+ RestrictedSitesZoneEnableCrossSiteScriptingFilter
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows
@@ -6221,7 +7157,7 @@ The XML below is the DDF for Windows 10, version 1709.
- RestrictedSitesZoneWRONG
+ RestrictedSitesZoneScriptingOfJavaApplets
@@ -6245,7 +7181,7 @@ The XML below is the DDF for Windows 10, version 1709.
- RestrictedSitesZoneWRONG2
+ RestrictedSitesZoneShowSecurityWarningForPotentiallyUnsafeFiles
@@ -6269,7 +7205,7 @@ The XML below is the DDF for Windows 10, version 1709.
- RestrictedSitesZoneWRONG3
+ RestrictedSitesZoneTurnOnCrossSiteScriptingFilter
@@ -6293,7 +7229,7 @@ The XML below is the DDF for Windows 10, version 1709.
- RestrictedSitesZoneWRONG4
+ RestrictedSitesZoneTurnOnProtectedMode
@@ -6317,7 +7253,7 @@ The XML below is the DDF for Windows 10, version 1709.
- RestrictedSitesZoneWRONG5
+ RestrictedSitesZoneUsePopupBlocker
@@ -6652,6 +7588,54 @@ The XML below is the DDF for Windows 10, version 1709.
+
+ TrustedSitesZoneDoNotRunAntimalwareAgainstActiveXControls
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ TrustedSitesZoneDontRunAntimalwareProgramsAgainstActiveXControls
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
TrustedSitesZoneInitializeAndScriptActiveXControls
@@ -6676,6 +7660,54 @@ The XML below is the DDF for Windows 10, version 1709.
+
+ TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedAsSafe
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedSafe
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
TrustedSitesZoneJavaPermissions
@@ -6724,54 +7756,6 @@ The XML below is the DDF for Windows 10, version 1709.
-
- TrustedSitesZoneWRONG1
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
-
-
- TrustedSitesZoneWRONG2
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
-
Notifications
@@ -7062,6 +8046,7 @@ The XML below is the DDF for Windows 10, version 1709.
text/plain
+ HighestValueMostSecure
@@ -7108,6 +8093,7 @@ The XML below is the DDF for Windows 10, version 1709.
AttachmentManager.admx
AttachmentManager~AT~WindowsComponents~AM_AM
AM_MarkZoneOnSavedAtttachments
+ LastWrite
@@ -7134,6 +8120,7 @@ The XML below is the DDF for Windows 10, version 1709.
AttachmentManager.admx
AttachmentManager~AT~WindowsComponents~AM_AM
AM_RemoveZoneInfo
+ LastWrite
@@ -7160,6 +8147,7 @@ The XML below is the DDF for Windows 10, version 1709.
AttachmentManager.admx
AttachmentManager~AT~WindowsComponents~AM_AM
AM_CallIOfficeAntiVirus
+ LastWrite
@@ -7202,6 +8190,7 @@ The XML below is the DDF for Windows 10, version 1709.
text/plain
+ LowestValueMostSecure
@@ -7248,6 +8237,7 @@ The XML below is the DDF for Windows 10, version 1709.
AutoPlay.admx
AutoPlay~AT~WindowsComponents~AutoPlay
NoAutoplayfornonVolume
+ LastWrite
@@ -7274,6 +8264,7 @@ The XML below is the DDF for Windows 10, version 1709.
AutoPlay.admx
AutoPlay~AT~WindowsComponents~AutoPlay
NoAutorun
+ LastWrite
@@ -7300,6 +8291,921 @@ The XML below is the DDF for Windows 10, version 1709.
AutoPlay.admx
AutoPlay~AT~WindowsComponents~AutoPlay
Autorun
+ LastWrite
+
+
+
+
+ Browser
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ AllowAddressBarDropdown
+
+
+
+
+ This policy setting lets you decide whether the Address bar drop-down functionality is available in Microsoft Edge. We recommend disabling this setting if you want to minimize network connections from Microsoft Edge to Microsoft services.
+ 1
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ LowestValueMostSecure
+
+
+
+ AllowAutofill
+
+
+
+
+ This setting lets you decide whether employees can use Autofill to automatically fill in form fields while using Microsoft Edge.
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LowestValueMostSecure
+
+
+
+ AllowBrowser
+
+
+
+
+
+ 1
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ desktop
+ LowestValueMostSecure
+
+
+
+ AllowCookies
+
+
+
+
+ This setting lets you configure how your company deals with cookies.
+ 2
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LowestValueMostSecure
+
+
+
+ AllowDeveloperTools
+
+
+
+
+ This setting lets you decide whether employees can use F12 Developer Tools on Microsoft Edge.
+ 1
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ LowestValueMostSecure
+
+
+
+ AllowDoNotTrack
+
+
+
+
+ This setting lets you decide whether employees can send Do Not Track headers to websites that request tracking info.
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LowestValueMostSecure
+
+
+
+ AllowExtensions
+
+
+
+
+ This setting lets you decide whether employees can load extensions in Microsoft Edge.
+ 1
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ LowestValueMostSecure
+
+
+
+ AllowFlash
+
+
+
+
+ This setting lets you decide whether employees can run Adobe Flash in Microsoft Edge.
+ 1
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ HighestValueMostSecure
+
+
+
+ AllowFlashClickToRun
+
+
+
+
+ Configure the Adobe Flash Click-to-Run setting.
+ 1
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ HighestValueMostSecure
+
+
+
+ AllowInPrivate
+
+
+
+
+ This setting lets you decide whether employees can browse using InPrivate website browsing.
+ 1
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LowestValueMostSecure
+
+
+
+ AllowMicrosoftCompatibilityList
+
+
+
+
+ This policy setting lets you decide whether the Microsoft Compatibility List is enabled or disabled in Microsoft Edge. This feature uses a Microsoft-provided list to ensure that any sites with known compatibility issues are displayed correctly when a user navigates to them. By default, the Microsoft Compatibility List is enabled and can be viewed by navigating to about:compat.
+
+If you enable or don’t configure this setting, Microsoft Edge will periodically download the latest version of the list from Microsoft and will apply the configurations specified there during browser navigation. If a user visits a site on the Microsoft Compatibility List, he or she will be prompted to open the site in Internet Explorer 11. Once in Internet Explorer, the site will automatically be rendered as if the user is viewing it in the previous version of Internet Explorer it requires to display correctly.
+
+If you disable this setting, the Microsoft Compatibility List will not be used during browser navigation.
+ 1
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LowestValueMostSecure
+
+
+
+ AllowPasswordManager
+
+
+
+
+ This setting lets you decide whether employees can save their passwords locally, using Password Manager.
+ 1
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LowestValueMostSecure
+
+
+
+ AllowPopups
+
+
+
+
+ This setting lets you decide whether to turn on Pop-up Blocker and whether to allow pop-ups to appear in secondary windows.
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ LowestValueMostSecure
+
+
+
+ AllowSearchEngineCustomization
+
+
+
+
+ Allow search engine customization for MDM enrolled devices. Users can change their default search engine.
+
+If this setting is turned on or not configured, users can add new search engines and change the default used in the address bar from within Microsoft Edge Settings.
+If this setting is disabled, users will be unable to add search engines or change the default used in the address bar.
+
+This policy will only apply on domain joined machines or when the device is MDM enrolled. For more information, see Microsoft browser extension policy (aka.ms/browserpolicy).
+ 1
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LowestValueMostSecure
+
+
+
+ AllowSearchSuggestionsinAddressBar
+
+
+
+
+ This setting lets you decide whether search suggestions should appear in the Address bar of Microsoft Edge.
+ 1
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LowestValueMostSecure
+
+
+
+ AllowSmartScreen
+
+
+
+
+ This setting lets you decide whether to turn on Windows Defender SmartScreen.
+ 1
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LowestValueMostSecure
+
+
+
+ AlwaysEnableBooksLibrary
+
+
+
+
+ Specifies whether the Books Library in Microsoft Edge will always be visible regardless of the country or region setting for the device.
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LowestValueMostSecure
+
+
+
+ ClearBrowsingDataOnExit
+
+
+
+
+ Specifies whether to always clear browsing history on exiting Microsoft Edge.
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ LowestValueMostSecure
+
+
+
+ ConfigureAdditionalSearchEngines
+
+
+
+
+ Allows you to add up to 5 additional search engines for MDM-enrolled devices.
+
+If this setting is turned on, you can add up to 5 additional search engines for your employee. For each additional search engine you wish to add, you must specify a link to the OpenSearch XML file that contains, at minimum, the short name and the URL to the search engine. This policy does not affect the default search engine. Employees will not be able to remove these search engines, but they can set any one of these as the default.
+
+If this setting is not configured, the search engines are the ones specified in the App settings. If this setting is disabled, the search engines you had added will be deleted from your employee's machine.
+
+Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on domain-joined machines or when the device is MDM-enrolled.
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LastWrite
+
+
+
+ DisableLockdownOfStartPages
+
+
+
+
+ Boolean policy that specifies whether the lockdown on the Start pages is disabled. This policy works with the Browser/HomePages policy, which locks down the Start pages that the users cannot modify. You can use the DisableLockdownOfStartPages policy to allow users to modify the Start pages when Browser/HomePages policy is in effect.
+
+Note: This policy has no effect when Browser/HomePages is not configured.
+
+Important
+This setting can only be used with domain-joined or MDM-enrolled devices. For more info, see the Microsoft browser extension policy (aka.ms/browserpolicy).
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ LowestValueMostSecure
+
+
+
+ EnterpriseModeSiteList
+
+
+
+
+ This setting lets you configure whether your company uses Enterprise Mode and the Enterprise Mode Site List to address common compatibility problems with legacy websites.
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ LastWrite
+
+
+
+ EnterpriseSiteListServiceUrl
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ LastWrite
+
+
+
+ FirstRunURL
+
+
+
+
+ Configure first run URL.
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ desktop
+ LastWrite
+
+
+
+ HomePages
+
+
+
+
+ Configure the Start page URLs for your employees.
+Example:
+If you wanted to allow contoso.com and fabrikam.com then you would append /support to the site strings like contoso.com/support and fabrikam.com/support.
+Encapsulate each string with greater than and less than characters like any other XML tag.
+
+Version 1703 or later: If you don't want to send traffic to Microsoft, you can use the about:blank value (encapsulate with greater than and less than characters like any other XML tag), which is honored for both domain- and non-domain-joined machines, when it's the only configured URL.
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ LastWrite
+
+
+
+ LockdownFavorites
+
+
+
+
+ This policy setting lets you decide whether employees can add, import, sort, or edit the Favorites list on Microsoft Edge.
+
+If you enable this setting, employees won't be able to add, import, or change anything in the Favorites list. Also as part of this, Save a Favorite, Import settings, and the context menu items (such as, Create a new folder) are all turned off.
+
+Important
+Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops employees from syncing their favorites between Internet Explorer and Microsoft Edge.
+
+If you disable or don't configure this setting (default), employees can add, import and make changes to the Favorites list.
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LowestValueMostSecure
+
+
+
+ PreventAccessToAboutFlagsInMicrosoftEdge
+
+
+
+
+ Prevent access to the about:flags page in Microsoft Edge.
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ HighestValueMostSecure
+
+
+
+ PreventFirstRunPage
+
+
+
+
+ Specifies whether the First Run webpage is prevented from automatically opening on the first launch of Microsoft Edge. This policy is only available for Windows 10 version 1703 or later for desktop.
+
+Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on domain-joined machines or when the device is MDM-enrolled.
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ HighestValueMostSecure
+
+
+
+ PreventLiveTileDataCollection
+
+
+
+
+ This policy lets you decide whether Microsoft Edge can gather Live Tile metadata from the ieonline.microsoft.com service to provide a better experience while pinning a Live Tile to the Start menu.
+
+Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on domain-joined machines or when the device is MDM-enrolled.
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ HighestValueMostSecure
+
+
+
+ PreventSmartScreenPromptOverride
+
+
+
+
+ Don't allow Windows Defender SmartScreen warning overrides
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ HighestValueMostSecure
+
+
+
+ PreventSmartScreenPromptOverrideForFiles
+
+
+
+
+ Don't allow Windows Defender SmartScreen warning overrides for unverified files.
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ HighestValueMostSecure
+
+
+
+ PreventUsingLocalHostIPAddressForWebRTC
+
+
+
+
+ Prevent using localhost IP address for WebRTC
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ HighestValueMostSecure
+
+
+
+ ProvisionFavorites
+
+
+
+
+ This policy setting allows you to configure a default set of favorites, which will appear for employees. Employees cannot modify, sort, move, export or delete these provisioned favorites.
+
+If you enable this setting, you can set favorite URL's and favorite folders to appear on top of users' favorites list (either in the Hub or Favorites Bar). The user favorites will appear after these provisioned favorites.
+
+Important
+Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops employees from syncing their favorites between Internet Explorer and Microsoft Edge.
+
+If you disable or don't configure this setting, employees will see the favorites they set in the Hub and Favorites Bar.
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LastWrite
+
+
+
+ SendIntranetTraffictoInternetExplorer
+
+
+
+
+ Sends all intranet traffic over to Internet Explorer.
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ HighestValueMostSecure
+
+
+
+ SetDefaultSearchEngine
+
+
+
+
+ Sets the default search engine for MDM-enrolled devices. Users can still change their default search engine.
+
+If this setting is turned on, you are setting the default search engine that you would like your employees to use. Employees can still change the default search engine, unless you apply the AllowSearchEngineCustomization policy which will disable the ability to change it. You must specify a link to the OpenSearch XML file that contains, at minimum, the short name and the URL to the search engine. If you would like for your employees to use the Edge factory settings for the default search engine for their market, set the string EDGEDEFAULT; if you would like for your employees to use Bing as the default search engine, set the string EDGEBING.
+
+If this setting is not configured, the default search engine is set to the one specified in App settings and can be changed by your employees. If this setting is disabled, the policy-set search engine will be removed, and, if it is the current default, the default will be set back to the factory Microsoft Edge search engine for the market.
+
+Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on domain-joined machines or when the device is MDM-enrolled.
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LastWrite
+
+
+
+ ShowMessageWhenOpeningSitesInInternetExplorer
+
+
+
+
+ Show message when opening sites in Internet Explorer
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ HighestValueMostSecure
+
+
+
+ SyncFavoritesBetweenIEAndMicrosoftEdge
+
+
+
+
+ Specifies whether favorites are kept in sync between Internet Explorer and Microsoft Edge. Changes to favorites in one browser are reflected in the other, including: additions, deletions, modifications, and ordering.
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ LowestValueMostSecure
@@ -7346,6 +9252,7 @@ The XML below is the DDF for Windows 10, version 1709.
credui.admx
CredUI~AT~WindowsComponents~CredUI
DisablePasswordReveal
+ LastWrite
@@ -7392,6 +9299,7 @@ The XML below is the DDF for Windows 10, version 1709.
desktop.admx
desktop~AT~Desktop
DisablePersonalDirChange
+ LastWrite
@@ -7414,28 +9322,6 @@ The XML below is the DDF for Windows 10, version 1709.
-
- AllowUserPrinterInstallation
-
-
-
-
- Boolean that specifies whether or not to allow user to install new printers
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
-
DefaultPrinterName
@@ -7456,6 +9342,30 @@ The XML below is the DDF for Windows 10, version 1709.
text/plain
+ LastWrite
+
+
+
+ PreventAddingNewPrinters
+
+
+
+
+ Boolean that specifies whether or not to prevent user to install new printers
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ HighestValueMostSecure
@@ -7478,6 +9388,7 @@ The XML below is the DDF for Windows 10, version 1709.
text/plain
+ LastWrite
@@ -7520,6 +9431,7 @@ The XML below is the DDF for Windows 10, version 1709.
text/plain
+ LastWrite
@@ -7542,6 +9454,7 @@ The XML below is the DDF for Windows 10, version 1709.
text/plain
+ LastWrite
@@ -7551,7 +9464,7 @@ The XML below is the DDF for Windows 10, version 1709.
A GUID identifying the client application authorized to retrieve OAuth tokens from the OAuthAuthority
- E1CF1107-FF90-4228-93BF-26052DD2C714
+
@@ -7564,6 +9477,7 @@ The XML below is the DDF for Windows 10, version 1709.
text/plain
+ LastWrite
@@ -7586,6 +9500,7 @@ The XML below is the DDF for Windows 10, version 1709.
text/plain
+ LastWrite
@@ -7608,6 +9523,7 @@ The XML below is the DDF for Windows 10, version 1709.
text/plain
+ LastWrite
@@ -7630,6 +9546,7 @@ The XML below is the DDF for Windows 10, version 1709.
text/plain
+ LastWrite
@@ -7672,6 +9589,7 @@ The XML below is the DDF for Windows 10, version 1709.
text/plain
+ LowestValueMostSecure
@@ -7695,6 +9613,7 @@ The XML below is the DDF for Windows 10, version 1709.
text/plain
phone
+ LowestValueMostSecure
@@ -7718,6 +9637,7 @@ The XML below is the DDF for Windows 10, version 1709.
text/plain
phone
+ LowestValueMostSecure
@@ -7741,6 +9661,7 @@ The XML below is the DDF for Windows 10, version 1709.
text/plain
phone
+ LowestValueMostSecure
@@ -7763,6 +9684,7 @@ The XML below is the DDF for Windows 10, version 1709.
text/plain
+ LowestValueMostSecure
@@ -7785,6 +9707,7 @@ The XML below is the DDF for Windows 10, version 1709.
text/plain
+ LowestValueMostSecure
@@ -7808,6 +9731,7 @@ The XML below is the DDF for Windows 10, version 1709.
text/plain
phone
+ LowestValueMostSecure
@@ -7854,6 +9778,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
AddSearchProvider
+ LastWrite
@@ -7880,6 +9805,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
TurnOnActiveXFiltering
+ LastWrite
@@ -7906,6 +9832,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement
AddonManagement_AddOnList
+ LastWrite
@@ -7932,6 +9859,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
RestrictFormSuggestPW
+ LastWrite
@@ -7958,6 +9886,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_PolicyWarnCertMismatch
+ LastWrite
@@ -7984,6 +9913,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~DeleteBrowsingHistory
DBHDisableDeleteOnExit
+ LastWrite
@@ -8010,6 +9940,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage
Advanced_EnableEnhancedProtectedMode
+ LastWrite
@@ -8036,6 +9967,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
EnterpriseModeEnable
+ LastWrite
@@ -8062,10 +9994,11 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
EnterpriseModeSiteList
+ LastWrite
- AllowInternetExplorer7PolicyList
+ AllowInternetExplorer7PolicyList
@@ -8088,6 +10021,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~CategoryCompatView
CompatView_UsePolicyList
+ LastWrite
@@ -8114,6 +10048,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~CategoryCompatView
CompatView_IntranetSites
+ LastWrite
@@ -8140,6 +10075,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_PolicyInternetZoneTemplate
+ LastWrite
@@ -8166,6 +10102,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_PolicyIntranetZoneTemplate
+ LastWrite
@@ -8192,6 +10129,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_PolicyLocalMachineZoneTemplate
+ LastWrite
@@ -8218,6 +10156,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_PolicyInternetZoneLockdownTemplate
+ LastWrite
@@ -8244,6 +10183,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_PolicyIntranetZoneLockdownTemplate
+ LastWrite
@@ -8270,6 +10210,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_PolicyLocalMachineZoneLockdownTemplate
+ LastWrite
@@ -8296,6 +10237,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_PolicyRestrictedSitesZoneLockdownTemplate
+ LastWrite
@@ -8322,6 +10264,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetSettings~Advanced~Browsing
UseIntranetSiteForOneWordEntry
+ LastWrite
@@ -8348,6 +10291,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_Zonemaps
+ LastWrite
@@ -8374,6 +10318,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_PolicyTrustedSitesZoneLockdownTemplate
+ LastWrite
@@ -8400,6 +10345,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage
Advanced_InvalidSignatureBlock
+ LastWrite
@@ -8426,6 +10372,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_PolicyRestrictedSitesZoneTemplate
+ LastWrite
@@ -8452,6 +10399,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
EnableSuggestedSites
+ LastWrite
@@ -8478,6 +10426,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_PolicyTrustedSitesZoneTemplate
+ LastWrite
@@ -8504,6 +10453,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage
Advanced_CertificateRevocation
+ LastWrite
@@ -8530,6 +10480,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage
Advanced_DownloadSignatures
+ LastWrite
@@ -8556,6 +10507,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryBinaryBehaviorSecurityRestriction
IESF_PolicyExplorerProcesses_2
+ LastWrite
@@ -8582,6 +10534,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement
DisableFlashInIE
+ LastWrite
@@ -8608,6 +10561,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement
VerMgmtDisable
+ LastWrite
@@ -8634,6 +10588,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
DisableSafetyFilterOverride
+ LastWrite
@@ -8660,6 +10615,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
DisableSafetyFilterOverrideForAppRepUnknown
+ LastWrite
@@ -8686,6 +10642,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~DeleteBrowsingHistory
RestrictHistory
+ LastWrite
@@ -8712,6 +10669,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
AddonManagement_RestrictCrashDetection
+ LastWrite
@@ -8738,10 +10696,11 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
SQM_DisableCEIP
+ LastWrite
- DisableDeletingUserVisitedWebsites
+ DisableDeletingUserVisitedWebsites
@@ -8764,6 +10723,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~DeleteBrowsingHistory
DBHDisableDeleteHistory
+ LastWrite
@@ -8790,6 +10750,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~RSS_Feeds
Disable_Downloading_of_Enclosures
+ LastWrite
@@ -8816,6 +10777,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage
Advanced_SetWinInetProtocols
+ LastWrite
@@ -8842,6 +10804,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
NoFirstRunCustomise
+ LastWrite
@@ -8868,6 +10831,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage
Advanced_DisableFlipAhead
+ LastWrite
@@ -8894,6 +10858,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
RestrictHomePage
+ LastWrite
@@ -8920,6 +10885,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL
NoCertError
+ LastWrite
@@ -8946,6 +10912,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~CategoryPrivacy
DisableInPrivateBrowsing
+ LastWrite
@@ -8972,6 +10939,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage
Advanced_EnableEnhancedProtectedMode64Bit
+ LastWrite
@@ -8998,6 +10966,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
RestrictProxy
+ LastWrite
@@ -9024,6 +10993,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
NoSearchProvider
+ LastWrite
@@ -9050,6 +11020,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
SecondaryHomePages
+ LastWrite
@@ -9076,6 +11047,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
Disable_Security_Settings_Check
+ LastWrite
@@ -9102,6 +11074,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage
Advanced_DisableEPMCompat
+ LastWrite
@@ -9128,6 +11101,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement
VerMgmtDisable
+ LastWrite
@@ -9154,6 +11128,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement
VerMgmtDomainAllowlist
+ LastWrite
@@ -9180,6 +11155,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_IncludeUnspecifiedLocalSites
+ LastWrite
@@ -9206,6 +11182,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_UNCAsIntranet
+ LastWrite
@@ -9232,6 +11209,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyAccessDataSourcesAcrossDomains_1
+ LastWrite
@@ -9258,6 +11236,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyNotificationBarActiveXURLaction_1
+ LastWrite
@@ -9284,6 +11263,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyNotificationBarDownloadURLaction_1
+ LastWrite
@@ -9310,6 +11290,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyAllowPasteViaScript_1
+ LastWrite
@@ -9336,6 +11317,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyDropOrPasteFiles_1
+ LastWrite
@@ -9362,6 +11344,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyFontDownload_1
+ LastWrite
@@ -9388,10 +11371,11 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyZoneElevationURLaction_1
+ LastWrite
- InternetZoneAllowLoadingOfXAMLFilesWRONG
+ InternetZoneAllowLoadingOfXAMLFiles
@@ -9414,6 +11398,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_Policy_XAML_1
+ LastWrite
@@ -9440,6 +11425,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyUnsignedFrameworkComponentsURLaction_1
+ LastWrite
@@ -9464,8 +11450,9 @@ The XML below is the DDF for Windows 10, version 1709.
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
- IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Intranet
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
+ IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Internet
+ LastWrite
@@ -9490,8 +11477,9 @@ The XML below is the DDF for Windows 10, version 1709.
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
- IZ_PolicyAllowTDCControl_Both_LocalMachine
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
+ IZ_PolicyAllowTDCControl_Both_Internet
+ LastWrite
@@ -9518,6 +11506,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_Policy_WebBrowserControl_1
+ LastWrite
@@ -9542,8 +11531,9 @@ The XML below is the DDF for Windows 10, version 1709.
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
- IZ_PolicyWindowsRestrictionsURLaction_6
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
+ IZ_PolicyWindowsRestrictionsURLaction_1
+ LastWrite
@@ -9570,6 +11560,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_Policy_AllowScriptlets_1
+ LastWrite
@@ -9596,6 +11587,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_Policy_Phishing_1
+ LastWrite
@@ -9622,6 +11614,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_Policy_ScriptStatusBar_1
+ LastWrite
@@ -9648,10 +11641,11 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyUserdataPersistence_1
+ LastWrite
- InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG1
+ InternetZoneDoNotRunAntimalwareAgainstActiveXControls
@@ -9674,32 +11668,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyAntiMalwareCheckingOfActiveXControls_1
-
-
-
- InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG2
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
- phone
- inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
- IZ_PolicyAntiMalwareCheckingOfActiveXControls_3
+ LastWrite
@@ -9724,8 +11693,9 @@ The XML below is the DDF for Windows 10, version 1709.
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
- IZ_PolicyDownloadSignedActiveX_3
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
+ IZ_PolicyDownloadSignedActiveX_1
+ LastWrite
@@ -9752,6 +11722,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyDownloadUnsignedActiveX_1
+ LastWrite
@@ -9776,8 +11747,9 @@ The XML below is the DDF for Windows 10, version 1709.
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
- IZ_PolicyTurnOnXSSFilter_Both_LocalMachine
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
+ IZ_PolicyTurnOnXSSFilter_Both_Internet
+ LastWrite
@@ -9804,6 +11776,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyDragDropAcrossDomainsAcrossWindows_Both_Internet
+ LastWrite
@@ -9830,6 +11803,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyDragDropAcrossDomainsWithinWindow_Both_Internet
+ LastWrite
@@ -9856,6 +11830,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyMimeSniffingURLaction_1
+ LastWrite
@@ -9880,8 +11855,9 @@ The XML below is the DDF for Windows 10, version 1709.
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
- IZ_Policy_TurnOnProtectedMode_2
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
+ IZ_Policy_TurnOnProtectedMode_1
+ LastWrite
@@ -9908,6 +11884,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_Policy_LocalPathForUpload_1
+ LastWrite
@@ -9934,36 +11911,11 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyScriptActiveXNotMarkedSafe_1
+ LastWrite
- InternetZoneInitializeAndScriptActiveXControlsNotMarkedSafe
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
- phone
- inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
- IZ_PolicyScriptActiveXNotMarkedSafe_1
-
-
-
- InternetZoneJavaPermissionsWRONG1
+ InternetZoneJavaPermissions
@@ -9986,32 +11938,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyJavaPermissions_1
-
-
-
- InternetZoneJavaPermissionsWRONG2
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
- phone
- inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
- IZ_PolicyJavaPermissions_3
+ LastWrite
@@ -10038,6 +11965,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyLaunchAppsAndFilesInIFRAME_1
+ LastWrite
@@ -10064,6 +11992,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyLogon_1
+ LastWrite
@@ -10090,6 +12019,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyNavigateSubframesAcrossDomains_1
+ LastWrite
@@ -10116,6 +12046,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyUnsignedFrameworkComponentsURLaction_1
+ LastWrite
@@ -10142,6 +12073,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicySignedFrameworkComponentsURLaction_1
+ LastWrite
@@ -10168,6 +12100,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_Policy_UnsafeFiles_1
+ LastWrite
@@ -10194,6 +12127,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyBlockPopupWindows_1
+ LastWrite
@@ -10220,6 +12154,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyZoneElevationURLaction_1
+ LastWrite
@@ -10246,6 +12181,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
IZ_PolicyAccessDataSourcesAcrossDomains_3
+ LastWrite
@@ -10272,6 +12208,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
IZ_PolicyNotificationBarActiveXURLaction_3
+ LastWrite
@@ -10298,6 +12235,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
IZ_PolicyNotificationBarDownloadURLaction_3
+ LastWrite
@@ -10324,6 +12262,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
IZ_PolicyFontDownload_3
+ LastWrite
@@ -10350,6 +12289,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
IZ_PolicyZoneElevationURLaction_3
+ LastWrite
@@ -10376,6 +12316,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
IZ_PolicyUnsignedFrameworkComponentsURLaction_3
+ LastWrite
@@ -10402,6 +12343,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
IZ_Policy_AllowScriptlets_3
+ LastWrite
@@ -10428,6 +12370,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
IZ_Policy_Phishing_3
+ LastWrite
@@ -10454,6 +12397,34 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
IZ_PolicyUserdataPersistence_3
+ LastWrite
+
+
+
+ IntranetZoneDoNotRunAntimalwareAgainstActiveXControls
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ inetres.admx
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
+ IZ_PolicyAntiMalwareCheckingOfActiveXControls_3
+ LastWrite
@@ -10480,6 +12451,61 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
IZ_PolicyScriptActiveXNotMarkedSafe_3
+ LastWrite
+
+
+
+ IntranetZoneInitializeAndScriptActiveXControlsNotMarkedSafe
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ inetres.admx
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
+ IZ_PolicyScriptActiveXNotMarkedSafe_3
+ LastWrite
+
+
+
+ IntranetZoneJavaPermissions
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ inetres.admx
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
+ IZ_PolicyJavaPermissions_3
+ LastWrite
@@ -10506,6 +12532,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
IZ_PolicyNavigateSubframesAcrossDomains_3
+ LastWrite
@@ -10532,6 +12559,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_PolicyAccessDataSourcesAcrossDomains_9
+ LastWrite
@@ -10558,6 +12586,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_PolicyNotificationBarActiveXURLaction_9
+ LastWrite
@@ -10584,6 +12613,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_PolicyNotificationBarDownloadURLaction_9
+ LastWrite
@@ -10610,6 +12640,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_PolicyFontDownload_9
+ LastWrite
@@ -10636,6 +12667,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_PolicyZoneElevationURLaction_9
+ LastWrite
@@ -10662,6 +12694,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_PolicyUnsignedFrameworkComponentsURLaction_9
+ LastWrite
@@ -10688,6 +12721,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_Policy_AllowScriptlets_9
+ LastWrite
@@ -10714,6 +12748,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_Policy_Phishing_9
+ LastWrite
@@ -10740,6 +12775,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_PolicyUserdataPersistence_9
+ LastWrite
@@ -10764,8 +12800,9 @@ The XML below is the DDF for Windows 10, version 1709.
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone~IZ_LocalMachineZone
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_PolicyAntiMalwareCheckingOfActiveXControls_9
+ LastWrite
@@ -10792,6 +12829,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_PolicyScriptActiveXNotMarkedSafe_9
+ LastWrite
@@ -10818,6 +12856,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_PolicyJavaPermissions_9
+ LastWrite
@@ -10844,6 +12883,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_PolicyNavigateSubframesAcrossDomains_9
+ LastWrite
@@ -10870,6 +12910,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
IZ_PolicyAccessDataSourcesAcrossDomains_2
+ LastWrite
@@ -10896,6 +12937,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
IZ_PolicyNotificationBarActiveXURLaction_2
+ LastWrite
@@ -10922,6 +12964,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
IZ_PolicyNotificationBarDownloadURLaction_2
+ LastWrite
@@ -10948,6 +12991,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
IZ_PolicyFontDownload_2
+ LastWrite
@@ -10974,6 +13018,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
IZ_PolicyZoneElevationURLaction_2
+ LastWrite
@@ -11000,6 +13045,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
IZ_PolicyUnsignedFrameworkComponentsURLaction_2
+ LastWrite
@@ -11026,6 +13072,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
IZ_Policy_AllowScriptlets_2
+ LastWrite
@@ -11052,6 +13099,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
IZ_Policy_Phishing_2
+ LastWrite
@@ -11078,6 +13126,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
IZ_PolicyUserdataPersistence_2
+ LastWrite
@@ -11104,6 +13153,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
IZ_PolicyScriptActiveXNotMarkedSafe_2
+ LastWrite
@@ -11130,6 +13180,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
IZ_PolicyJavaPermissions_2
+ LastWrite
@@ -11156,6 +13207,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
IZ_PolicyNavigateSubframesAcrossDomains_2
+ LastWrite
@@ -11182,6 +13234,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown
IZ_PolicyAccessDataSourcesAcrossDomains_4
+ LastWrite
@@ -11208,6 +13261,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown
IZ_PolicyNotificationBarActiveXURLaction_4
+ LastWrite
@@ -11234,6 +13288,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown
IZ_PolicyNotificationBarDownloadURLaction_4
+ LastWrite
@@ -11260,6 +13315,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown
IZ_PolicyFontDownload_4
+ LastWrite
@@ -11286,6 +13342,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown
IZ_PolicyZoneElevationURLaction_4
+ LastWrite
@@ -11312,6 +13369,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown
IZ_PolicyUnsignedFrameworkComponentsURLaction_4
+ LastWrite
@@ -11338,6 +13396,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown
IZ_Policy_AllowScriptlets_4
+ LastWrite
@@ -11364,6 +13423,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown
IZ_Policy_Phishing_4
+ LastWrite
@@ -11390,6 +13450,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown
IZ_PolicyUserdataPersistence_4
+ LastWrite
@@ -11416,6 +13477,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown
IZ_PolicyScriptActiveXNotMarkedSafe_4
+ LastWrite
@@ -11442,6 +13504,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown
IZ_PolicyNavigateSubframesAcrossDomains_4
+ LastWrite
@@ -11468,6 +13531,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown
IZ_PolicyAccessDataSourcesAcrossDomains_10
+ LastWrite
@@ -11494,6 +13558,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown
IZ_PolicyNotificationBarActiveXURLaction_10
+ LastWrite
@@ -11520,6 +13585,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown
IZ_PolicyNotificationBarDownloadURLaction_10
+ LastWrite
@@ -11546,6 +13612,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown
IZ_PolicyFontDownload_10
+ LastWrite
@@ -11572,6 +13639,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown
IZ_PolicyZoneElevationURLaction_10
+ LastWrite
@@ -11598,6 +13666,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown
IZ_PolicyUnsignedFrameworkComponentsURLaction_10
+ LastWrite
@@ -11624,6 +13693,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown
IZ_Policy_AllowScriptlets_10
+ LastWrite
@@ -11650,6 +13720,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown
IZ_Policy_Phishing_10
+ LastWrite
@@ -11676,6 +13747,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown
IZ_PolicyUserdataPersistence_10
+ LastWrite
@@ -11702,6 +13774,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown
IZ_PolicyScriptActiveXNotMarkedSafe_10
+ LastWrite
@@ -11728,6 +13801,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown
IZ_PolicyJavaPermissions_10
+ LastWrite
@@ -11754,6 +13828,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown
IZ_PolicyNavigateSubframesAcrossDomains_10
+ LastWrite
@@ -11780,6 +13855,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown
IZ_PolicyAccessDataSourcesAcrossDomains_8
+ LastWrite
@@ -11806,6 +13882,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown
IZ_PolicyNotificationBarActiveXURLaction_8
+ LastWrite
@@ -11832,6 +13909,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown
IZ_PolicyNotificationBarDownloadURLaction_8
+ LastWrite
@@ -11858,6 +13936,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown
IZ_PolicyFontDownload_8
+ LastWrite
@@ -11884,6 +13963,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown
IZ_PolicyZoneElevationURLaction_8
+ LastWrite
@@ -11910,6 +13990,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown
IZ_PolicyUnsignedFrameworkComponentsURLaction_8
+ LastWrite
@@ -11936,6 +14017,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown
IZ_Policy_AllowScriptlets_8
+ LastWrite
@@ -11962,6 +14044,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown
IZ_Policy_Phishing_8
+ LastWrite
@@ -11988,6 +14071,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown
IZ_PolicyUserdataPersistence_8
+ LastWrite
@@ -12014,6 +14098,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown
IZ_PolicyScriptActiveXNotMarkedSafe_8
+ LastWrite
@@ -12040,6 +14125,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown
IZ_PolicyJavaPermissions_8
+ LastWrite
@@ -12066,6 +14152,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown
IZ_PolicyNavigateSubframesAcrossDomains_8
+ LastWrite
@@ -12092,6 +14179,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
IZ_PolicyAccessDataSourcesAcrossDomains_6
+ LastWrite
@@ -12118,6 +14206,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
IZ_PolicyNotificationBarActiveXURLaction_6
+ LastWrite
@@ -12144,6 +14233,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
IZ_PolicyNotificationBarDownloadURLaction_6
+ LastWrite
@@ -12170,6 +14260,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
IZ_PolicyFontDownload_6
+ LastWrite
@@ -12196,6 +14287,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
IZ_PolicyZoneElevationURLaction_6
+ LastWrite
@@ -12222,6 +14314,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
IZ_PolicyUnsignedFrameworkComponentsURLaction_6
+ LastWrite
@@ -12248,6 +14341,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
IZ_Policy_AllowScriptlets_6
+ LastWrite
@@ -12274,6 +14368,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
IZ_Policy_Phishing_6
+ LastWrite
@@ -12300,6 +14395,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
IZ_PolicyUserdataPersistence_6
+ LastWrite
@@ -12326,6 +14422,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
IZ_PolicyScriptActiveXNotMarkedSafe_6
+ LastWrite
@@ -12352,6 +14449,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
IZ_PolicyJavaPermissions_6
+ LastWrite
@@ -12378,6 +14476,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
IZ_PolicyNavigateSubframesAcrossDomains_6
+ LastWrite
@@ -12404,6 +14503,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryMimeSniffingSafetyFeature
IESF_PolicyExplorerProcesses_6
+ LastWrite
@@ -12430,6 +14530,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryMKProtocolSecurityRestriction
IESF_PolicyExplorerProcesses_3
+ LastWrite
@@ -12456,6 +14557,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryInformationBar
IESF_PolicyExplorerProcesses_10
+ LastWrite
@@ -12480,8 +14582,9 @@ The XML below is the DDF for Windows 10, version 1709.
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
- IZ_PolicyDownloadSignedActiveX_1
+ inetres~AT~WindowsComponents~InternetExplorer
+ Disable_Managing_Safety_Filter_IE9
+ LastWrite
@@ -12508,6 +14611,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
DisablePerUserActiveXInstall
+ LastWrite
@@ -12534,6 +14638,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryProtectionFromZoneElevation
IESF_PolicyAllProcesses_9
+ LastWrite
@@ -12560,6 +14665,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement
VerMgmtDisableRunThisTime
+ LastWrite
@@ -12586,6 +14692,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryRestrictActiveXInstall
IESF_PolicyAllProcesses_11
+ LastWrite
@@ -12612,6 +14719,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyAccessDataSourcesAcrossDomains_7
+ LastWrite
@@ -12636,8 +14744,9 @@ The XML below is the DDF for Windows 10, version 1709.
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
- IZ_PolicyActiveScripting_1
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
+ IZ_PolicyActiveScripting_7
+ LastWrite
@@ -12664,6 +14773,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyNotificationBarActiveXURLaction_7
+ LastWrite
@@ -12690,6 +14800,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyNotificationBarDownloadURLaction_7
+ LastWrite
@@ -12714,8 +14825,9 @@ The XML below is the DDF for Windows 10, version 1709.
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
- IZ_PolicyBinaryBehaviors_1
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
+ IZ_PolicyBinaryBehaviors_7
+ LastWrite
@@ -12742,6 +14854,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyAllowPasteViaScript_7
+ LastWrite
@@ -12768,6 +14881,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyDropOrPasteFiles_7
+ LastWrite
@@ -12792,12 +14906,13 @@ The XML below is the DDF for Windows 10, version 1709.
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
- IZ_PolicyFileDownload_1
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
+ IZ_PolicyFileDownload_7
+ LastWrite
- RestrictedSitesZoneAllowFontDownloadsWRONG1
+ RestrictedSitesZoneAllowFontDownloads
@@ -12820,32 +14935,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyFontDownload_7
-
-
-
- RestrictedSitesZoneAllowFontDownloadsWRONG2
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
- phone
- inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
- IZ_PolicyFontDownload_1
+ LastWrite
@@ -12872,6 +14962,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyZoneElevationURLaction_7
+ LastWrite
@@ -12898,6 +14989,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_Policy_XAML_7
+ LastWrite
@@ -12922,8 +15014,9 @@ The XML below is the DDF for Windows 10, version 1709.
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
- IZ_PolicyAllowMETAREFRESH_1
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
+ IZ_PolicyAllowMETAREFRESH_7
+ LastWrite
@@ -12950,6 +15043,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyUnsignedFrameworkComponentsURLaction_7
+ LastWrite
@@ -12976,6 +15070,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Restricted
+ LastWrite
@@ -13002,6 +15097,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyAllowTDCControl_Both_Restricted
+ LastWrite
@@ -13028,6 +15124,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_Policy_WebBrowserControl_7
+ LastWrite
@@ -13054,6 +15151,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyWindowsRestrictionsURLaction_7
+ LastWrite
@@ -13080,6 +15178,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_Policy_AllowScriptlets_7
+ LastWrite
@@ -13106,6 +15205,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_Policy_Phishing_7
+ LastWrite
@@ -13132,6 +15232,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_Policy_ScriptStatusBar_7
+ LastWrite
@@ -13158,6 +15259,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyUserdataPersistence_7
+ LastWrite
@@ -13184,6 +15286,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyAntiMalwareCheckingOfActiveXControls_7
+ LastWrite
@@ -13210,6 +15313,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyDownloadSignedActiveX_7
+ LastWrite
@@ -13236,6 +15340,34 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyDownloadUnsignedActiveX_7
+ LastWrite
+
+
+
+ RestrictedSitesZoneEnableCrossSiteScriptingFilter
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ inetres.admx
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
+ IZ_PolicyTurnOnXSSFilter_Both_Restricted
+ LastWrite
@@ -13262,6 +15394,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyDragDropAcrossDomainsAcrossWindows_Both_Restricted
+ LastWrite
@@ -13288,6 +15421,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyDragDropAcrossDomainsWithinWindow_Both_Restricted
+ LastWrite
@@ -13314,6 +15448,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyMimeSniffingURLaction_7
+ LastWrite
@@ -13340,6 +15475,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_Policy_LocalPathForUpload_7
+ LastWrite
@@ -13366,6 +15502,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyScriptActiveXNotMarkedSafe_7
+ LastWrite
@@ -13392,6 +15529,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyJavaPermissions_7
+ LastWrite
@@ -13418,6 +15556,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyLaunchAppsAndFilesInIFRAME_7
+ LastWrite
@@ -13444,6 +15583,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyLogon_7
+ LastWrite
@@ -13470,6 +15610,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyNavigateSubframesAcrossDomains_7
+ LastWrite
@@ -13494,8 +15635,9 @@ The XML below is the DDF for Windows 10, version 1709.
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
- IZ_PolicyNavigateSubframesAcrossDomains_1
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
+ IZ_PolicyNavigateSubframesAcrossDomains_7
+ LastWrite
@@ -13520,8 +15662,9 @@ The XML below is the DDF for Windows 10, version 1709.
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
- IZ_PolicyRunActiveXControls_1
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
+ IZ_PolicyRunActiveXControls_7
+ LastWrite
@@ -13548,6 +15691,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicySignedFrameworkComponentsURLaction_7
+ LastWrite
@@ -13572,12 +15716,13 @@ The XML below is the DDF for Windows 10, version 1709.
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
- IZ_PolicyScriptActiveXMarkedSafe_1
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
+ IZ_PolicyScriptActiveXMarkedSafe_7
+ LastWrite
- RestrictedSitesZoneWRONG
+ RestrictedSitesZoneScriptingOfJavaApplets
@@ -13598,12 +15743,13 @@ The XML below is the DDF for Windows 10, version 1709.
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
- IZ_PolicyScriptingOfJavaApplets_6
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
+ IZ_PolicyScriptingOfJavaApplets_7
+ LastWrite
- RestrictedSitesZoneWRONG2
+ RestrictedSitesZoneShowSecurityWarningForPotentiallyUnsafeFiles
@@ -13626,10 +15772,11 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_Policy_UnsafeFiles_7
+ LastWrite
- RestrictedSitesZoneWRONG3
+ RestrictedSitesZoneTurnOnCrossSiteScriptingFilter
@@ -13652,10 +15799,11 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyTurnOnXSSFilter_Both_Restricted
+ LastWrite
- RestrictedSitesZoneWRONG4
+ RestrictedSitesZoneTurnOnProtectedMode
@@ -13678,10 +15826,11 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_Policy_TurnOnProtectedMode_7
+ LastWrite
- RestrictedSitesZoneWRONG5
+ RestrictedSitesZoneUsePopupBlocker
@@ -13704,6 +15853,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyBlockPopupWindows_7
+ LastWrite
@@ -13730,6 +15880,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryRestrictFileDownload
IESF_PolicyAllProcesses_12
+ LastWrite
@@ -13756,6 +15907,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryScriptedWindowSecurityRestrictions
IESF_PolicyAllProcesses_8
+ LastWrite
@@ -13782,6 +15934,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
SpecificSearchProvider
+ LastWrite
@@ -13808,6 +15961,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
OnlyUseAXISForActiveXInstall
+ LastWrite
@@ -13834,6 +15988,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
IZ_PolicyAccessDataSourcesAcrossDomains_5
+ LastWrite
@@ -13860,6 +16015,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
IZ_PolicyNotificationBarActiveXURLaction_5
+ LastWrite
@@ -13886,6 +16042,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
IZ_PolicyNotificationBarDownloadURLaction_5
+ LastWrite
@@ -13912,6 +16069,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
IZ_PolicyFontDownload_5
+ LastWrite
@@ -13938,6 +16096,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
IZ_PolicyZoneElevationURLaction_5
+ LastWrite
@@ -13964,6 +16123,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
IZ_PolicyUnsignedFrameworkComponentsURLaction_5
+ LastWrite
@@ -13990,6 +16150,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
IZ_Policy_AllowScriptlets_5
+ LastWrite
@@ -14016,6 +16177,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
IZ_Policy_Phishing_5
+ LastWrite
@@ -14042,6 +16204,61 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
IZ_PolicyUserdataPersistence_5
+ LastWrite
+
+
+
+ TrustedSitesZoneDoNotRunAntimalwareAgainstActiveXControls
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ inetres.admx
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
+ IZ_PolicyAntiMalwareCheckingOfActiveXControls_5
+ LastWrite
+
+
+
+ TrustedSitesZoneDontRunAntimalwareProgramsAgainstActiveXControls
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ inetres.admx
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
+ IZ_PolicyAntiMalwareCheckingOfActiveXControls_5
+ LastWrite
@@ -14068,6 +16285,61 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
IZ_PolicyScriptActiveXNotMarkedSafe_5
+ LastWrite
+
+
+
+ TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedAsSafe
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ inetres.admx
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
+ IZ_PolicyScriptActiveXNotMarkedSafe_5
+ LastWrite
+
+
+
+ TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedSafe
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ inetres.admx
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
+ IZ_PolicyScriptActiveXNotMarkedSafe_5
+ LastWrite
@@ -14094,6 +16366,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
IZ_PolicyJavaPermissions_5
+ LastWrite
@@ -14120,58 +16393,7 @@ The XML below is the DDF for Windows 10, version 1709.
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
IZ_PolicyNavigateSubframesAcrossDomains_5
-
-
-
- TrustedSitesZoneWRONG1
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
- phone
- inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
- IZ_PolicyAntiMalwareCheckingOfActiveXControls_5
-
-
-
- TrustedSitesZoneWRONG2
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
- phone
- inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
- IZ_PolicyScriptActiveXNotMarkedSafe_5
+ LastWrite
@@ -14214,6 +16436,7 @@ The XML below is the DDF for Windows 10, version 1709.
text/plain
+ LowestValueMostSecure
@@ -14260,6 +16483,7 @@ The XML below is the DDF for Windows 10, version 1709.
Printing.admx
Printing~AT~ControlPanel~CplPrinters
PointAndPrint_Restrictions
+ LastWrite
@@ -14302,6 +16526,7 @@ The XML below is the DDF for Windows 10, version 1709.
text/plain
+ LastWrite
@@ -14345,6 +16570,7 @@ The XML below is the DDF for Windows 10, version 1709.
text/plain
phone
+ LastWrite
@@ -14387,6 +16613,7 @@ The XML below is the DDF for Windows 10, version 1709.
text/plain
+ LowestValueMostSecure
@@ -14642,87 +16869,6 @@ The XML below is the DDF for Windows 10, version 1709.
-
- AccountPolicies
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- MinDevicePasswordLength
-
-
-
-
-
-
-
- This security setting determines the least number of characters that a password for a user account may contain. You can set a value of between 1 and 14 characters, or you can establish that no password is required by setting the number of characters to 0.
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
-
-
- PasswordMustMeetComplexityRequirement
-
-
-
-
-
-
-
- This security setting determines whether passwords must meet complexity requirements.
-
-If this policy is enabled, passwords must meet the following minimum requirements:
-
-Not contain the user's account name or parts of the user's full name that exceed two consecutive characters
-Be at least six characters in length
-Contain characters from three of the following four categories:
-English uppercase characters (A through Z)
-English lowercase characters (a through z)
-Base 10 digits (0 through 9)
-Non-alphabetic characters (for example, !, $, #, %)
-Complexity requirements are enforced when passwords are changed or created.
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
-
-
Accounts
@@ -15910,6 +18056,30 @@ Complexity requirements are enforced when passwords are changed or created.
+
+ AllowAadPasswordReset
+
+
+
+
+
+
+
+ Specifies whether password reset is enabled for AAD accounts.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
AllowFastReconnect
@@ -16537,7 +18707,7 @@ Complexity requirements are enforced when passwords are changed or created.
This policy setting lets you decide whether the Microsoft Compatibility List is enabled or disabled in Microsoft Edge. This feature uses a Microsoft-provided list to ensure that any sites with known compatibility issues are displayed correctly when a user navigates to them. By default, the Microsoft Compatibility List is enabled and can be viewed by navigating to about:compat.
-If you enable or don’t configure this setting, Microsoft Edge will periodically download the latest version of the list from Microsoft and will apply the configurations specified there during browser navigation. If a user visits a site on the Microsoft Compatibility List, he or she will be prompted to open the site in Internet Explorer 11. Once in Internet Explorer, the site will automatically be rendered as if the user is viewing it in the previous version of Internet Explorer it requires to display correctly.
+If you enable or don’t configure this setting, Microsoft Edge will periodically download the latest version of the list from Microsoft and will apply the configurations specified there during browser navigation. If a user visits a site on the Microsoft Compatibility List, he or she will be prompted to open the site in Internet Explorer 11. Once in Internet Explorer, the site will automatically be rendered as if the user is viewing it in the previous version of Internet Explorer it requires to display correctly.
If you disable this setting, the Microsoft Compatibility List will not be used during browser navigation.
@@ -16679,6 +18849,30 @@ This policy will only apply on domain joined machines or when the device is MDM
+
+ AlwaysEnableBooksLibrary
+
+
+
+
+
+
+
+ Specifies whether the Books Library in Microsoft Edge will always be visible regardless of the country or region setting for the device.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
ClearBrowsingDataOnExit
@@ -16848,7 +19042,7 @@ Example:
If you wanted to allow contoso.com and fabrikam.com then you would append /support to the site strings like contoso.com/support and fabrikam.com/support.
Encapsulate each string with greater than and less than characters like any other XML tag.
-Version 1703 or later:  If you don't want to send traffic to Microsoft, you can use the about:blank value (encapsulate with greater than and less than characters like any other XML tag), which is honored for both domain- and non-domain-joined machines, when it's the only configured URL.
+Version 1703 or later: If you don't want to send traffic to Microsoft, you can use the about:blank value (encapsulate with greater than and less than characters like any other XML tag), which is honored for both domain- and non-domain-joined machines, when it's the only configured URL.
@@ -16863,6 +19057,37 @@ Version 1703 or later:  If you don't want to send traffic to Microsoft, yo
+
+ LockdownFavorites
+
+
+
+
+
+
+
+ This policy setting lets you decide whether employees can add, import, sort, or edit the Favorites list on Microsoft Edge.
+
+If you enable this setting, employees won't be able to add, import, or change anything in the Favorites list. Also as part of this, Save a Favorite, Import settings, and the context menu items (such as, Create a new folder) are all turned off.
+
+Important
+Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops employees from syncing their favorites between Internet Explorer and Microsoft Edge.
+
+If you disable or don't configure this setting (default), employees can add, import and make changes to the Favorites list.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
PreventAccessToAboutFlagsInMicrosoftEdge
@@ -17011,6 +19236,37 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
+
+ ProvisionFavorites
+
+
+
+
+
+
+
+ This policy setting allows you to configure a default set of favorites, which will appear for employees. Employees cannot modify, sort, move, export or delete these provisioned favorites.
+
+If you enable this setting, you can set favorite URL's and favorite folders to appear on top of users' favorites list (either in the Hub or Favorites Bar). The user favorites will appear after these provisioned favorites.
+
+Important
+Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops employees from syncing their favorites between Internet Explorer and Microsoft Edge.
+
+If you disable or don't configure this setting, employees will see the favorites they set in the Hub and Favorites Bar.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
SendIntranetTraffictoInternetExplorer
@@ -17181,6 +19437,102 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
+
+ LetAppsAccessCellularData
+
+
+
+
+
+
+
+ This policy setting specifies whether Windows apps can access cellular data.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ LetAppsAccessCellularData_ForceAllowTheseApps
+
+
+
+
+
+
+
+ List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ LetAppsAccessCellularData_ForceDenyTheseApps
+
+
+
+
+
+
+
+ List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ LetAppsAccessCellularData_UserInControlOfTheseApps
+
+
+
+
+
+
+
+ List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the cellular data access setting for the listed apps. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
ShowAppCellularAccessUI
@@ -17633,6 +19985,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
+
+ EnableWindowsAutoPilotResetCredentials
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
CredentialsUI
@@ -18845,6 +21221,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
+
+ DOCacheHost
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
DODownloadMode
@@ -19520,7 +21920,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
- Specifies how many passwords can be stored in the history that can’t be used.
+ Specifies how many passwords can be stored in the history that can’t be used.
@@ -20468,6 +22868,52 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
+
+ ExploitGuard
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ ExploitProtectionSettings
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
Games
@@ -20514,6 +22960,52 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
+
+ Handwriting
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ PanelDefaultModeDocked
+
+
+
+
+
+
+
+ Specifies whether the handwriting panel comes up floating near the text box or attached to the bottom of the screen
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
InternetExplorer
@@ -20752,7 +23244,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
- AllowInternetExplorer7PolicyList
+ AllowInternetExplorer7PolicyList
@@ -21376,7 +23868,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
- DisableDeletingUserVisitedWebsites
+ DisableDeletingUserVisitedWebsites
@@ -22024,7 +24516,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
- InternetZoneAllowLoadingOfXAMLFilesWRONG
+ InternetZoneAllowLoadingOfXAMLFiles
@@ -22264,31 +24756,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
- InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG1
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
-
-
- InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG2
+ InternetZoneDoNotRunAntimalwareAgainstActiveXControls
@@ -22528,55 +24996,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
- InternetZoneInitializeAndScriptActiveXControlsNotMarkedSafe
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
-
-
- InternetZoneJavaPermissionsWRONG1
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
-
-
- InternetZoneJavaPermissionsWRONG2
+ InternetZoneJavaPermissions
@@ -23007,6 +25427,30 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
+
+ IntranetZoneDoNotRunAntimalwareAgainstActiveXControls
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
IntranetZoneInitializeAndScriptActiveXControls
@@ -23031,6 +25475,54 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
+
+ IntranetZoneInitializeAndScriptActiveXControlsNotMarkedSafe
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ IntranetZoneJavaPermissions
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
IntranetZoneNavigateWindowsAndFrames
@@ -25168,31 +27660,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
- RestrictedSitesZoneAllowFontDownloadsWRONG1
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
-
-
- RestrictedSitesZoneAllowFontDownloadsWRONG2
+ RestrictedSitesZoneAllowFontDownloads
@@ -25575,6 +28043,30 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
+
+ RestrictedSitesZoneEnableCrossSiteScriptingFilter
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows
@@ -25888,7 +28380,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
- RestrictedSitesZoneWRONG
+ RestrictedSitesZoneScriptingOfJavaApplets
@@ -25912,7 +28404,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
- RestrictedSitesZoneWRONG2
+ RestrictedSitesZoneShowSecurityWarningForPotentiallyUnsafeFiles
@@ -25936,7 +28428,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
- RestrictedSitesZoneWRONG3
+ RestrictedSitesZoneTurnOnCrossSiteScriptingFilter
@@ -25960,7 +28452,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
- RestrictedSitesZoneWRONG4
+ RestrictedSitesZoneTurnOnProtectedMode
@@ -25984,7 +28476,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
- RestrictedSitesZoneWRONG5
+ RestrictedSitesZoneUsePopupBlocker
@@ -26080,7 +28572,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
- SecurityZonesUseOnlyMachineSettings
+ SecurityZonesUseOnlyMachineSettings
@@ -26343,6 +28835,54 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
+
+ TrustedSitesZoneDoNotRunAntimalwareAgainstActiveXControls
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ TrustedSitesZoneDontRunAntimalwareProgramsAgainstActiveXControls
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
TrustedSitesZoneInitializeAndScriptActiveXControls
@@ -26367,6 +28907,54 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
+
+ TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedAsSafe
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedSafe
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
TrustedSitesZoneJavaPermissions
@@ -26415,54 +29003,6 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
-
- TrustedSitesZoneWRONG1
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
-
-
- TrustedSitesZoneWRONG2
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
-
Kerberos
@@ -26708,9 +29248,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
This policy setting prevents users from adding new Microsoft accounts on this computer.
-If you select the "Users can’t add Microsoft accounts" option, users will not be able to create new Microsoft accounts on this computer, switch a local account to a Microsoft account, or connect a domain account to a Microsoft account. This is the preferred option if you need to limit the use of Microsoft accounts in your enterprise.
+If you select the "Users can’t add Microsoft accounts" option, users will not be able to create new Microsoft accounts on this computer, switch a local account to a Microsoft account, or connect a domain account to a Microsoft account. This is the preferred option if you need to limit the use of Microsoft accounts in your enterprise.
-If you select the "Users can’t add or log on with Microsoft accounts" option, existing Microsoft account users will not be able to log on to Windows. Selecting this option might make it impossible for an existing administrator on this computer to log on and manage the system.
+If you select the "Users can’t add or log on with Microsoft accounts" option, existing Microsoft account users will not be able to log on to Windows. Selecting this option might make it impossible for an existing administrator on this computer to log on and manage the system.
If you disable or do not configure this policy (recommended), users will be able to use Microsoft accounts with Windows.
@@ -26883,6 +29423,130 @@ Default: Guest.
+
+ Devices_AllowedToFormatAndEjectRemovableMedia
+
+
+
+
+
+
+
+ Devices: Allowed to format and eject removable media
+
+This security setting determines who is allowed to format and eject removable NTFS media. This capability can be given to:
+
+Administrators
+Administrators and Interactive Users
+
+Default: This policy is not defined and only Administrators have this ability.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ Devices_AllowUndockWithoutHavingToLogon
+
+
+
+
+
+
+
+ Devices: Allow undock without having to log on
+This security setting determines whether a portable computer can be undocked without having to log on. If this policy is enabled, logon is not required and an external hardware eject button can be used to undock the computer. If disabled, a user must log on and have the Remove computer from docking station privilege to undock the computer.
+Default: Enabled.
+
+Caution
+Disabling this policy may tempt users to try and physically remove the laptop from its docking station using methods other than the external hardware eject button. Since this may cause damage to the hardware, this setting, in general, should only be disabled on laptop configurations that are physically securable.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ Devices_PreventUsersFromInstallingPrinterDriversWhenConnectingToSharedPrinters
+
+
+
+
+
+
+
+ Devices: Prevent users from installing printer drivers when connecting to shared printers
+
+For a computer to print to a shared printer, the driver for that shared printer must be installed on the local computer. This security setting determines who is allowed to install a printer driver as part of connecting to a shared printer. If this setting is enabled, only Administrators can install a printer driver as part of connecting to a shared printer. If this setting is disabled, any user can install a printer driver as part of connecting to a shared printer.
+
+Default on servers: Enabled.
+Default on workstations: Disabled
+
+Notes
+
+This setting does not affect the ability to add a local printer.
+This setting does not affect Administrators.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ Devices_RestrictCDROMAccessToLocallyLoggedOnUserOnly
+
+
+
+
+
+
+
+ Devices: Restrict CD-ROM access to locally logged-on user only
+
+This security setting determines whether a CD-ROM is accessible to both local and remote users simultaneously.
+
+If this policy is enabled, it allows only the interactively logged-on user to access removable CD-ROM media. If this policy is enabled and no one is logged on interactively, the CD-ROM can be accessed over the network.
+
+Default: This policy is not defined and CD-ROM access is not restricted to the locally logged-on user.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked
@@ -26911,7 +29575,7 @@ Do not display user information (3)
- Interactivelogon_DoNotDisplayLastSignedIn
+ InteractiveLogon_DoNotDisplayLastSignedIn
@@ -26941,7 +29605,7 @@ Default: Disabled.
- Interactivelogon_DoNotDisplayUsernameAtSignIn
+ InteractiveLogon_DoNotDisplayUsernameAtSignIn
@@ -26971,7 +29635,7 @@ Default: Disabled.
- Interactivelogon_DoNotRequireCTRLALTDEL
+ InteractiveLogon_DoNotRequireCTRLALTDEL
@@ -27233,6 +29897,39 @@ Default: This policy is not defined and automatic administrative logon is not al
+
+ Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn
+
+
+
+
+
+
+
+ Shutdown: Allow system to be shut down without having to log on
+
+This security setting determines whether a computer can be shut down without having to log on to Windows.
+
+When this policy is enabled, the Shut Down command is available on the Windows logon screen.
+
+When this policy is disabled, the option to shut down the computer does not appear on the Windows logon screen. In this case, users must be able to log on to the computer successfully and have the Shut down the system user right before they can perform a system shutdown.
+
+Default on workstations: Enabled.
+Default on servers: Disabled.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
Shutdown_ClearVirtualMemoryPageFile
@@ -27278,9 +29975,9 @@ Default: Disabled.
This policy setting controls whether User Interface Accessibility (UIAccess or UIA) programs can automatically disable the secure desktop for elevation prompts used by a standard user.
-• Enabled: UIA programs, including Windows Remote Assistance, automatically disable the secure desktop for elevation prompts. If you do not disable the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting, the prompts appear on the interactive user's desktop instead of the secure desktop.
+• Enabled: UIA programs, including Windows Remote Assistance, automatically disable the secure desktop for elevation prompts. If you do not disable the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting, the prompts appear on the interactive user's desktop instead of the secure desktop.
-• Disabled: (Default) The secure desktop can be disabled only by the user of the interactive desktop or by disabling the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting.
+• Disabled: (Default) The secure desktop can be disabled only by the user of the interactive desktop or by disabling the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting.
@@ -27310,17 +30007,17 @@ This policy setting controls the behavior of the elevation prompt for administra
The options are:
-• Elevate without prompting: Allows privileged accounts to perform an operation that requires elevation without requiring consent or credentials. Note: Use this option only in the most constrained environments.
+• Elevate without prompting: Allows privileged accounts to perform an operation that requires elevation without requiring consent or credentials. Note: Use this option only in the most constrained environments.
-• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a privileged user name and password. If the user enters valid credentials, the operation continues with the user's highest available privilege.
+• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a privileged user name and password. If the user enters valid credentials, the operation continues with the user's highest available privilege.
-• Prompt for consent on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.
+• Prompt for consent on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.
-• Prompt for credentials: When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
+• Prompt for credentials: When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
-• Prompt for consent: When an operation requires elevation of privilege, the user is prompted to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.
+• Prompt for consent: When an operation requires elevation of privilege, the user is prompted to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.
-• Prompt for consent for non-Windows binaries: (Default) When an operation for a non-Microsoft application requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.
+• Prompt for consent for non-Windows binaries: (Default) When an operation for a non-Microsoft application requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.
@@ -27349,11 +30046,43 @@ This policy setting controls the behavior of the elevation prompt for standard u
The options are:
-• Prompt for credentials: (Default) When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
+• Prompt for credentials: (Default) When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
-• Automatically deny elevation requests: When an operation requires elevation of privilege, a configurable access denied error message is displayed. An enterprise that is running desktops as standard user may choose this setting to reduce help desk calls.
+• Automatically deny elevation requests: When an operation requires elevation of privilege, a configurable access denied error message is displayed. An enterprise that is running desktops as standard user may choose this setting to reduce help desk calls.
-• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
+• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ UserAccountControl_DetectApplicationInstallationsAndPromptForElevation
+
+
+
+
+
+
+
+ User Account Control: Detect application installations and prompt for elevation
+
+This policy setting controls the behavior of application installation detection for the computer.
+
+The options are:
+
+Enabled: (Default) When an application installation package is detected that requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
+
+Disabled: Application installation packages are not detected and prompted for elevation. Enterprises that are running standard user desktops and use delegated installation technologies such as Group Policy Software Installation or Systems Management Server (SMS) should disable this policy setting. In this case, installer detection is unnecessary.
@@ -27383,9 +30112,9 @@ This policy setting enforces public key infrastructure (PKI) signature checks fo
The options are:
-• Enabled: Enforces the PKI certification path validation for a given executable file before it is permitted to run.
+• Enabled: Enforces the PKI certification path validation for a given executable file before it is permitted to run.
-• Disabled: (Default) Does not enforce PKI certification path validation before a given executable file is permitted to run.
+• Disabled: (Default) Does not enforce PKI certification path validation before a given executable file is permitted to run.
@@ -27413,17 +30142,17 @@ The options are:
This policy setting controls whether applications that request to run with a User Interface Accessibility (UIAccess) integrity level must reside in a secure location in the file system. Secure locations are limited to the following:
-- …\Program Files\, including subfolders
-- …\Windows\system32\
-- …\Program Files (x86)\, including subfolders for 64-bit versions of Windows
+- …\Program Files\, including subfolders
+- …\Windows\system32\
+- …\Program Files (x86)\, including subfolders for 64-bit versions of Windows
Note: Windows enforces a public key infrastructure (PKI) signature check on any interactive application that requests to run with a UIAccess integrity level regardless of the state of this security setting.
The options are:
-• Enabled: (Default) If an application resides in a secure location in the file system, it runs only with UIAccess integrity.
+• Enabled: (Default) If an application resides in a secure location in the file system, it runs only with UIAccess integrity.
-• Disabled: An application runs with UIAccess integrity even if it does not reside in a secure location in the file system.
+• Disabled: An application runs with UIAccess integrity even if it does not reside in a secure location in the file system.
@@ -27453,9 +30182,9 @@ This policy setting controls the behavior of all User Account Control (UAC) poli
The options are:
-• Enabled: (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode.
+• Enabled: (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode.
-• Disabled: Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced.
+• Disabled: Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced.
@@ -27485,9 +30214,9 @@ This policy setting controls whether the elevation request prompt is displayed o
The options are:
-• Enabled: (Default) All elevation requests go to the secure desktop regardless of prompt behavior policy settings for administrators and standard users.
+• Enabled: (Default) All elevation requests go to the secure desktop regardless of prompt behavior policy settings for administrators and standard users.
-• Disabled: All elevation requests go to the interactive user's desktop. Prompt behavior policy settings for administrators and standard users are used.
+• Disabled: All elevation requests go to the interactive user's desktop. Prompt behavior policy settings for administrators and standard users are used.
@@ -27517,9 +30246,9 @@ This policy setting controls the behavior of Admin Approval Mode for the built-i
The options are:
-• Enabled: The built-in Administrator account uses Admin Approval Mode. By default, any operation that requires elevation of privilege will prompt the user to approve the operation.
+• Enabled: The built-in Administrator account uses Admin Approval Mode. By default, any operation that requires elevation of privilege will prompt the user to approve the operation.
-• Disabled: (Default) The built-in Administrator account runs all applications with full administrative privilege.
+• Disabled: (Default) The built-in Administrator account runs all applications with full administrative privilege.
@@ -27549,9 +30278,9 @@ This policy setting controls whether application write failures are redirected t
The options are:
-• Enabled: (Default) Application write failures are redirected at run time to defined user locations for both the file system and registry.
+• Enabled: (Default) Application write failures are redirected at run time to defined user locations for both the file system and registry.
-• Disabled: Applications that write data to protected locations fail.
+• Disabled: Applications that write data to protected locations fail.
@@ -28846,102 +31575,6 @@ The options are:
-
- LetAppsAccessCellularData
-
-
-
-
-
-
-
- This policy setting specifies whether Windows apps can access cellular data.
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
-
-
- LetAppsAccessCellularData_ForceAllowTheseApps
-
-
-
-
-
-
-
- List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps.
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
-
-
- LetAppsAccessCellularData_ForceDenyTheseApps
-
-
-
-
-
-
-
- List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps.
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
-
-
- LetAppsAccessCellularData_UserInControlOfTheseApps
-
-
-
-
-
-
-
- List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the cellular data privacy setting for the listed apps. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps.
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
-
LetAppsAccessContacts
@@ -30199,7 +32832,7 @@ The options are:
- This policy setting specifies whether Windows apps can sync with devices.
+ This policy setting specifies whether Windows apps can communicate with unpaired wireless devices.
@@ -30223,7 +32856,7 @@ The options are:
- List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps.
+ List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will be allowed to communicate with unpaired wireless devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps.
@@ -30247,7 +32880,7 @@ The options are:
- List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps.
+ List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not be allowed to communicate with unpaired wireless devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps.
@@ -30271,7 +32904,7 @@ The options are:
- List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the 'sync with devices' privacy setting for the listed apps. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps.
+ List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the 'Communicate with unpaired wireless devices' privacy setting for the listed apps. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps.
@@ -31258,6 +33891,30 @@ The options are:
+
+ AllowCloudSearch
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
AllowIndexingEncryptedStoresOrItems
@@ -32950,6 +35607,30 @@ The options are:
+
+ AllowDiskHealthModelUpdates
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
EnhancedStorageDevices
@@ -33221,7 +35902,7 @@ The options are:
- This policy setting lets you prevent apps and features from working with files on OneDrive. If you enable this policy setting: users can’t access OneDrive from the OneDrive app and file picker; Windows Store apps can’t access OneDrive using the WinRT API; OneDrive doesn’t appear in the navigation pane in File Explorer; OneDrive files aren’t kept in sync with the cloud; Users can’t automatically upload photos and videos from the camera roll folder. If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage.
+ This policy setting lets you prevent apps and features from working with files on OneDrive. If you enable this policy setting: users can’t access OneDrive from the OneDrive app and file picker; Windows Store apps can’t access OneDrive using the WinRT API; OneDrive doesn’t appear in the navigation pane in File Explorer; OneDrive files aren’t kept in sync with the cloud; Users can’t automatically upload photos and videos from the camera roll folder. If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage.
@@ -33260,6 +35941,30 @@ The options are:
+
+ FeedbackHubAlwaysSaveDiagnosticsLocally
+
+
+
+
+
+
+
+ Diagnostic files created when a feedback is filed in the Feedback Hub app will always be saved locally. If this policy is not present or set to false, users will be presented with the option to save locally. The default is to not save locally.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
TelemetryProxy
@@ -34070,6 +36775,30 @@ The options are:
+
+ DisableDualScan
+
+
+
+
+
+
+
+ Do not allow update deferral policies to cause scans against Windows Update
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
EngagedRestartDeadline
@@ -34239,7 +36968,7 @@ The options are:
- ManageBuildPreview
+ ManagePreviewBuilds
@@ -35739,6 +38468,7 @@ The options are:
text/plain
desktop
+ LowestValueMostSecure
@@ -35761,6 +38491,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -35783,83 +38514,7 @@ The options are:
text/plain
-
-
-
-
- AccountPolicies
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- MinDevicePasswordLength
-
-
-
-
- This security setting determines the least number of characters that a password for a user account may contain. You can set a value of between 1 and 14 characters, or you can establish that no password is required by setting the number of characters to 0.
- 7
-
-
-
-
-
-
-
-
-
-
- text/plain
-
- phone
-
-
-
- PasswordMustMeetComplexityRequirement
-
-
-
-
- This security setting determines whether passwords must meet complexity requirements.
-
-If this policy is enabled, passwords must meet the following minimum requirements:
-
-Not contain the user's account name or parts of the user's full name that exceed two consecutive characters
-Be at least six characters in length
-Contain characters from three of the following four categories:
-English uppercase characters (A through Z)
-English lowercase characters (a through z)
-Base 10 digits (0 through 9)
-Non-alphabetic characters (for example, !, $, #, %)
-Complexity requirements are enforced when passwords are changed or created.
- 0
-
-
-
-
-
-
-
-
-
-
- text/plain
-
- phone
+ LowestValueMostSecure
@@ -35902,6 +38557,7 @@ Complexity requirements are enforced when passwords are changed or created.
text/plain
+ LowestValueMostSecure
@@ -35924,6 +38580,7 @@ Complexity requirements are enforced when passwords are changed or created.
text/plain
+ LowestValueMostSecure
@@ -35946,6 +38603,7 @@ Complexity requirements are enforced when passwords are changed or created.
text/plain
+ LastWrite
@@ -35968,6 +38626,7 @@ Complexity requirements are enforced when passwords are changed or created.
text/plain
+ LastWrite
@@ -36014,6 +38673,7 @@ Complexity requirements are enforced when passwords are changed or created.ActiveXInstallService.admx
ActiveXInstallService~AT~WindowsComponents~AxInstSv
ApprovedActiveXInstallSites
+ LastWrite
@@ -36057,6 +38717,7 @@ Complexity requirements are enforced when passwords are changed or created.text/plain
phone
+ LastWrite
@@ -36099,6 +38760,7 @@ Complexity requirements are enforced when passwords are changed or created.
text/plain
+ LowestValueMostSecure
@@ -36121,6 +38783,7 @@ Complexity requirements are enforced when passwords are changed or created.
text/plain
+ LowestValueMostSecure
@@ -36143,6 +38806,7 @@ Complexity requirements are enforced when passwords are changed or created.
text/plain
+ LowestValueMostSecure
@@ -36166,6 +38830,7 @@ Complexity requirements are enforced when passwords are changed or created.text/plain
phone
+ LowestValueMostSecure
@@ -36188,6 +38853,7 @@ Complexity requirements are enforced when passwords are changed or created.
text/plain
+ LowestValueMostSecure
@@ -36211,6 +38877,7 @@ Complexity requirements are enforced when passwords are changed or created.text/plain
desktop
+ LowestValueMostSecure
@@ -36234,6 +38901,7 @@ Complexity requirements are enforced when passwords are changed or created.text/plain
desktop
+ LastWrite
@@ -36256,6 +38924,7 @@ Complexity requirements are enforced when passwords are changed or created.
text/plain
+ LowestValueMostSecure
@@ -36278,6 +38947,7 @@ Complexity requirements are enforced when passwords are changed or created.
text/plain
+ LowestValueMostSecure
@@ -36300,6 +38970,7 @@ Complexity requirements are enforced when passwords are changed or created.
text/plain
+ LowestValueMostSecure
@@ -36346,6 +39017,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV
EnableAppV
+ LastWrite
@@ -36372,6 +39044,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Virtualization
Virtualization_JITVEnable
+ LastWrite
@@ -36398,6 +39071,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_PackageManagement
PackageManagement_AutoCleanupEnable
+ LastWrite
@@ -36424,6 +39098,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Scripting
Scripting_Enable_Package_Scripts
+ LastWrite
@@ -36450,6 +39125,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Publishing
Enable_Publishing_Refresh_UX
+ LastWrite
@@ -36476,6 +39152,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Reporting
Reporting_Server_Policy
+ LastWrite
@@ -36502,6 +39179,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Integration
Integration_Roaming_File_Exclusions
+ LastWrite
@@ -36528,6 +39206,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Integration
Integration_Roaming_Registry_Exclusions
+ LastWrite
@@ -36554,6 +39233,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Streaming
Steaming_Autoload
+ LastWrite
@@ -36580,6 +39260,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Client_Coexistence
Client_Coexistence_Enable_Migration_mode
+ LastWrite
@@ -36606,6 +39287,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Integration
Integration_Root_User
+ LastWrite
@@ -36632,6 +39314,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Integration
Integration_Root_Global
+ LastWrite
@@ -36658,6 +39341,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Publishing
Publishing_Server1_Policy
+ LastWrite
@@ -36684,6 +39368,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Publishing
Publishing_Server2_Policy
+ LastWrite
@@ -36710,6 +39395,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Publishing
Publishing_Server3_Policy
+ LastWrite
@@ -36736,6 +39422,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Publishing
Publishing_Server4_Policy
+ LastWrite
@@ -36762,6 +39449,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Publishing
Publishing_Server5_Policy
+ LastWrite
@@ -36788,6 +39476,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Streaming
Streaming_Certificate_Filter_For_Client_SSL
+ LastWrite
@@ -36814,6 +39503,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Streaming
Streaming_Allow_High_Cost_Launch
+ LastWrite
@@ -36840,6 +39530,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Streaming
Streaming_Location_Provider
+ LastWrite
@@ -36866,6 +39557,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Streaming
Streaming_Package_Installation_Root
+ LastWrite
@@ -36892,6 +39584,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Streaming
Streaming_Package_Source_Root
+ LastWrite
@@ -36918,6 +39611,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Streaming
Streaming_Reestablishment_Interval
+ LastWrite
@@ -36944,6 +39638,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Streaming
Streaming_Reestablishment_Retries
+ LastWrite
@@ -36970,6 +39665,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Streaming
Streaming_Shared_Content_Store_Mode
+ LastWrite
@@ -36996,6 +39692,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Streaming
Streaming_Support_Branch_Cache
+ LastWrite
@@ -37022,6 +39719,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Streaming
Streaming_Verify_Certificate_Revocation_List
+ LastWrite
@@ -37048,6 +39746,7 @@ Complexity requirements are enforced when passwords are changed or created.appv.admx
appv~AT~System~CAT_AppV~CAT_Virtualization
Virtualization_JITVAllowList
+ LastWrite
@@ -37070,6 +39769,30 @@ Complexity requirements are enforced when passwords are changed or created.
+
+ AllowAadPasswordReset
+
+
+
+
+ Specifies whether password reset is enabled for AAD accounts.
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ LowestValueMostSecure
+
+
AllowFastReconnect
@@ -37090,6 +39813,7 @@ Complexity requirements are enforced when passwords are changed or created.
text/plain
+ LowestValueMostSecure
@@ -37113,6 +39837,7 @@ Complexity requirements are enforced when passwords are changed or created.text/plain
phone
+ LowestValueMostSecure
@@ -37135,6 +39860,7 @@ Complexity requirements are enforced when passwords are changed or created.
text/plain
+ LowestValueMostSecure
@@ -37181,6 +39907,7 @@ Complexity requirements are enforced when passwords are changed or created.AutoPlay.admx
AutoPlay~AT~WindowsComponents~AutoPlay
NoAutoplayfornonVolume
+ LastWrite
@@ -37207,6 +39934,7 @@ Complexity requirements are enforced when passwords are changed or created.AutoPlay.admx
AutoPlay~AT~WindowsComponents~AutoPlay
NoAutorun
+ LastWrite
@@ -37233,6 +39961,7 @@ Complexity requirements are enforced when passwords are changed or created.AutoPlay.admx
AutoPlay~AT~WindowsComponents~AutoPlay
Autorun
+ LastWrite
@@ -37275,6 +40004,7 @@ Complexity requirements are enforced when passwords are changed or created.
text/plain
+ LastWrite
@@ -37317,6 +40047,7 @@ Complexity requirements are enforced when passwords are changed or created.
text/plain
+ LowestValueMostSecure
@@ -37339,6 +40070,7 @@ Complexity requirements are enforced when passwords are changed or created.
text/plain
+ LowestValueMostSecure
@@ -37361,6 +40093,7 @@ Complexity requirements are enforced when passwords are changed or created.
text/plain
+ LowestValueMostSecure
@@ -37383,6 +40116,7 @@ Complexity requirements are enforced when passwords are changed or created.
text/plain
+ LastWrite
@@ -37405,6 +40139,7 @@ Complexity requirements are enforced when passwords are changed or created.
text/plain
+ LastWrite
@@ -37448,6 +40183,7 @@ Complexity requirements are enforced when passwords are changed or created.text/plain
phone
+ LowestValueMostSecure
@@ -37470,6 +40206,7 @@ Complexity requirements are enforced when passwords are changed or created.
text/plain
+ LowestValueMostSecure
@@ -37493,6 +40230,7 @@ Complexity requirements are enforced when passwords are changed or created.text/plain
desktop
+ LowestValueMostSecure
@@ -37515,6 +40253,7 @@ Complexity requirements are enforced when passwords are changed or created.
text/plain
+ LowestValueMostSecure
@@ -37538,6 +40277,7 @@ Complexity requirements are enforced when passwords are changed or created.text/plain
phone
+ LowestValueMostSecure
@@ -37560,6 +40300,7 @@ Complexity requirements are enforced when passwords are changed or created.
text/plain
+ LowestValueMostSecure
@@ -37583,6 +40324,7 @@ Complexity requirements are enforced when passwords are changed or created.text/plain
phone
+ LowestValueMostSecure
@@ -37606,6 +40348,7 @@ Complexity requirements are enforced when passwords are changed or created.text/plain
phone
+ HighestValueMostSecure
@@ -37629,6 +40372,7 @@ Complexity requirements are enforced when passwords are changed or created.text/plain
phone
+ HighestValueMostSecure
@@ -37651,6 +40395,7 @@ Complexity requirements are enforced when passwords are changed or created.
text/plain
+ LowestValueMostSecure
@@ -37661,7 +40406,7 @@ Complexity requirements are enforced when passwords are changed or created.
This policy setting lets you decide whether the Microsoft Compatibility List is enabled or disabled in Microsoft Edge. This feature uses a Microsoft-provided list to ensure that any sites with known compatibility issues are displayed correctly when a user navigates to them. By default, the Microsoft Compatibility List is enabled and can be viewed by navigating to about:compat.
-If you enable or don’t configure this setting, Microsoft Edge will periodically download the latest version of the list from Microsoft and will apply the configurations specified there during browser navigation. If a user visits a site on the Microsoft Compatibility List, he or she will be prompted to open the site in Internet Explorer 11. Once in Internet Explorer, the site will automatically be rendered as if the user is viewing it in the previous version of Internet Explorer it requires to display correctly.
+If you enable or don’t configure this setting, Microsoft Edge will periodically download the latest version of the list from Microsoft and will apply the configurations specified there during browser navigation. If a user visits a site on the Microsoft Compatibility List, he or she will be prompted to open the site in Internet Explorer 11. Once in Internet Explorer, the site will automatically be rendered as if the user is viewing it in the previous version of Internet Explorer it requires to display correctly.
If you disable this setting, the Microsoft Compatibility List will not be used during browser navigation.
1
@@ -37677,6 +40422,7 @@ If you disable this setting, the Microsoft Compatibility List will not be used d
text/plain
+ LowestValueMostSecure
@@ -37699,6 +40445,7 @@ If you disable this setting, the Microsoft Compatibility List will not be used d
text/plain
+ LowestValueMostSecure
@@ -37722,6 +40469,7 @@ If you disable this setting, the Microsoft Compatibility List will not be used d
text/plain
phone
+ LowestValueMostSecure
@@ -37749,6 +40497,7 @@ This policy will only apply on domain joined machines or when the device is MDM
text/plain
+ LowestValueMostSecure
@@ -37771,6 +40520,7 @@ This policy will only apply on domain joined machines or when the device is MDM
text/plain
+ LowestValueMostSecure
@@ -37793,6 +40543,30 @@ This policy will only apply on domain joined machines or when the device is MDM
text/plain
+ LowestValueMostSecure
+
+
+
+ AlwaysEnableBooksLibrary
+
+
+
+
+ Specifies whether the Books Library in Microsoft Edge will always be visible regardless of the country or region setting for the device.
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LowestValueMostSecure
@@ -37816,6 +40590,7 @@ This policy will only apply on domain joined machines or when the device is MDM
text/plain
phone
+ LowestValueMostSecure
@@ -37844,6 +40619,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ LastWrite
@@ -37872,6 +40648,7 @@ This setting can only be used with domain-joined or MDM-enrolled devices. For mo
text/plain
phone
+ LowestValueMostSecure
@@ -37895,6 +40672,7 @@ This setting can only be used with domain-joined or MDM-enrolled devices. For mo
text/plain
phone
+ LastWrite
@@ -37918,6 +40696,7 @@ This setting can only be used with domain-joined or MDM-enrolled devices. For mo
text/plain
phone
+ LastWrite
@@ -37941,6 +40720,7 @@ This setting can only be used with domain-joined or MDM-enrolled devices. For mo
text/plain
desktop
+ LastWrite
@@ -37954,7 +40734,7 @@ Example:
If you wanted to allow contoso.com and fabrikam.com then you would append /support to the site strings like contoso.com/support and fabrikam.com/support.
Encapsulate each string with greater than and less than characters like any other XML tag.
-Version 1703 or later:  If you don't want to send traffic to Microsoft, you can use the about:blank value (encapsulate with greater than and less than characters like any other XML tag), which is honored for both domain- and non-domain-joined machines, when it's the only configured URL.
+Version 1703 or later: If you don't want to send traffic to Microsoft, you can use the about:blank value (encapsulate with greater than and less than characters like any other XML tag), which is honored for both domain- and non-domain-joined machines, when it's the only configured URL.
@@ -37969,6 +40749,37 @@ Version 1703 or later:  If you don't want to send traffic to Microsoft, yo
text/plain
phone
+ LastWrite
+
+
+
+ LockdownFavorites
+
+
+
+
+ This policy setting lets you decide whether employees can add, import, sort, or edit the Favorites list on Microsoft Edge.
+
+If you enable this setting, employees won't be able to add, import, or change anything in the Favorites list. Also as part of this, Save a Favorite, Import settings, and the context menu items (such as, Create a new folder) are all turned off.
+
+Important
+Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops employees from syncing their favorites between Internet Explorer and Microsoft Edge.
+
+If you disable or don't configure this setting (default), employees can add, import and make changes to the Favorites list.
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LowestValueMostSecure
@@ -37991,6 +40802,7 @@ Version 1703 or later:  If you don't want to send traffic to Microsoft, yo
text/plain
+ HighestValueMostSecure
@@ -38016,6 +40828,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ HighestValueMostSecure
@@ -38040,6 +40853,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ HighestValueMostSecure
@@ -38062,6 +40876,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ HighestValueMostSecure
@@ -38084,6 +40899,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ HighestValueMostSecure
@@ -38106,6 +40922,37 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ HighestValueMostSecure
+
+
+
+ ProvisionFavorites
+
+
+
+
+ This policy setting allows you to configure a default set of favorites, which will appear for employees. Employees cannot modify, sort, move, export or delete these provisioned favorites.
+
+If you enable this setting, you can set favorite URL's and favorite folders to appear on top of users' favorites list (either in the Hub or Favorites Bar). The user favorites will appear after these provisioned favorites.
+
+Important
+Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops employees from syncing their favorites between Internet Explorer and Microsoft Edge.
+
+If you disable or don't configure this setting, employees will see the favorites they set in the Hub and Favorites Bar.
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LastWrite
@@ -38129,6 +40976,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ HighestValueMostSecure
@@ -38157,6 +41005,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ LastWrite
@@ -38180,6 +41029,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ HighestValueMostSecure
@@ -38203,6 +41053,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LowestValueMostSecure
@@ -38245,6 +41096,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ LowestValueMostSecure
@@ -38267,6 +41119,101 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
+
+ LetAppsAccessCellularData
+
+
+
+
+ This policy setting specifies whether Windows apps can access cellular data.
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ HighestValueMostSecure
+
+
+
+ LetAppsAccessCellularData_ForceAllowTheseApps
+
+
+
+
+ List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps.
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LastWrite
+ ;
+
+
+
+ LetAppsAccessCellularData_ForceDenyTheseApps
+
+
+
+
+ List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps.
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LastWrite
+ ;
+
+
+
+ LetAppsAccessCellularData_UserInControlOfTheseApps
+
+
+
+
+ List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the cellular data access setting for the listed apps. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps.
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LastWrite
+ ;
+
+
ShowAppCellularAccessUI
@@ -38290,6 +41237,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
wwansvc.admx
wwansvc~AT~Network~WwanSvc_Category~UISettings_Category
ShowAppCellularAccessUI
+ LastWrite
@@ -38332,6 +41280,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ LowestValueMostSecure
@@ -38354,6 +41303,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ LowestValueMostSecure
@@ -38376,6 +41326,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ LowestValueMostSecure
@@ -38398,6 +41349,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ LowestValueMostSecure
@@ -38421,6 +41373,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
desktop
+ LowestValueMostSecure
@@ -38444,6 +41397,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
desktop
+ LowestValueMostSecure
@@ -38466,6 +41420,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ LowestValueMostSecure
@@ -38488,6 +41443,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ LowestValueMostSecure
@@ -38514,6 +41470,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
ICM.admx
ICM~AT~System~InternetManagement~InternetManagement_Settings
DisableHTTPPrinting_2
+ LastWrite
@@ -38540,6 +41497,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
ICM.admx
ICM~AT~System~InternetManagement~InternetManagement_Settings
DisableWebPnPDownload_2
+ LastWrite
@@ -38566,6 +41524,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
ICM.admx
ICM~AT~System~InternetManagement~InternetManagement_Settings
ShellPreventWPWDownload_2
+ LastWrite
@@ -38588,6 +41547,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ HighestValueMostSecure
@@ -38614,6 +41574,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
networkprovider.admx
NetworkProvider~AT~Network~Cat_NetworkProvider
Pol_HardenedPaths
+ LastWrite
@@ -38640,6 +41601,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
NetworkConnections.admx
NetworkConnections~AT~Network~NetworkConnections
NC_AllowNetBridge_NLA
+ LastWrite
@@ -38686,6 +41648,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
credentialproviders.admx
CredentialProviders~AT~System~Logon
AllowDomainPINLogon
+ LastWrite
@@ -38712,6 +41675,30 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
credentialproviders.admx
CredentialProviders~AT~System~Logon
BlockDomainPicturePassword
+ LastWrite
+
+
+
+ EnableWindowsAutoPilotResetCredentials
+
+
+
+
+
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LowestValueMostSecure
@@ -38758,6 +41745,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
credui.admx
CredUI~AT~WindowsComponents~CredUI
DisablePasswordReveal
+ LastWrite
@@ -38784,6 +41772,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
credui.admx
CredUI~AT~WindowsComponents~CredUI
EnumerateAdministrators
+ LastWrite
@@ -38826,6 +41815,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ LastWrite
@@ -38848,6 +41838,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ LastWrite
@@ -38890,6 +41881,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ LowestValueMostSecure
@@ -38912,6 +41904,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ LastWrite
@@ -38957,6 +41950,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
wwansvc.admx
wwansvc~AT~Network~WwanSvc_Category~NetworkCost_Category
SetCost3G
+ LastWrite
@@ -38982,6 +41976,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
wwansvc.admx
wwansvc~AT~Network~WwanSvc_Category~NetworkCost_Category
SetCost4G
+ LastWrite
@@ -39025,6 +42020,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ HighestValueMostSecure
@@ -39048,6 +42044,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ HighestValueMostSecure
@@ -39071,6 +42068,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ HighestValueMostSecure
@@ -39094,6 +42092,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ HighestValueMostSecure
@@ -39117,6 +42116,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ HighestValueMostSecure
@@ -39140,6 +42140,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ HighestValueMostSecure
@@ -39163,6 +42164,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ HighestValueMostSecure
@@ -39186,6 +42188,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ HighestValueMostSecure
@@ -39209,6 +42212,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ HighestValueMostSecure
@@ -39232,6 +42236,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ HighestValueMostSecure
@@ -39255,6 +42260,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ HighestValueMostSecure
@@ -39278,6 +42284,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ HighestValueMostSecure
@@ -39301,6 +42308,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39324,6 +42332,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39347,6 +42356,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39370,6 +42380,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39393,6 +42404,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39416,6 +42428,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39439,6 +42452,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39462,6 +42476,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39485,6 +42500,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39508,6 +42524,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39531,6 +42548,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39554,6 +42572,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39577,6 +42596,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39600,6 +42620,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39623,6 +42644,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39646,6 +42668,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LowestValueMostSecure
@@ -39669,6 +42692,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39692,6 +42716,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39715,6 +42740,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39738,6 +42764,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39761,6 +42788,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39784,6 +42812,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ HighestValueMostSecure
@@ -39807,6 +42836,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39850,6 +42880,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39873,6 +42904,31 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LowestValueMostSecure
+
+
+
+ DOCacheHost
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ LastWrite
@@ -39896,6 +42952,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39919,6 +42976,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39942,6 +43000,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39965,6 +43024,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -39988,6 +43048,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -40011,6 +43072,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -40034,6 +43096,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -40057,6 +43120,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -40080,6 +43144,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -40103,6 +43168,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -40126,6 +43192,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -40149,6 +43216,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -40172,6 +43240,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -40195,6 +43264,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -40238,6 +43308,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ HighestValueMostSecure
@@ -40261,6 +43332,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LowestValueMostSecureZeroHasNoLimits
@@ -40284,6 +43356,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ HighestValueMostSecure
@@ -40330,6 +43403,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
deviceinstallation.admx
DeviceInstallation~AT~System~DeviceInstall_Category~DeviceInstall_Restrictions_Category
DeviceInstall_IDs_Deny
+ LastWrite
@@ -40356,6 +43430,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
deviceinstallation.admx
DeviceInstallation~AT~System~DeviceInstall_Category~DeviceInstall_Restrictions_Category
DeviceInstall_Classes_Deny
+ LastWrite
@@ -40399,6 +43474,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
desktop
+ LowestValueMostSecure
@@ -40421,6 +43497,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ LastWrite
@@ -40443,6 +43520,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ LowestValueMostSecure
@@ -40465,6 +43543,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ LowestValueMostSecure
@@ -40487,6 +43566,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ LowestValueMostSecure
@@ -40509,6 +43589,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ LowestValueMostSecureZeroHasNoLimits
@@ -40517,7 +43598,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
- Specifies how many passwords can be stored in the history that can’t be used.
+ Specifies how many passwords can be stored in the history that can’t be used.
0
@@ -40531,6 +43612,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ HighestValueMostSecure
@@ -40554,6 +43636,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
phone
+ LastWrite
@@ -40576,6 +43659,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ LastWrite
@@ -40598,6 +43682,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ LowestValueMostSecureZeroHasNoLimits
@@ -40620,6 +43705,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ LowestValueMostSecureZeroHasNoLimits
@@ -40643,6 +43729,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
desktop
+ LowestValueMostSecure
@@ -40665,6 +43752,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ HighestValueMostSecure
@@ -40687,6 +43775,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
text/plain
+ HighestValueMostSecureZeroHasNoLimits
@@ -40714,6 +43803,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
text/plain
phone
+ HighestValueMostSecure
@@ -40740,6 +43830,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
ControlPanelDisplay.admx
ControlPanelDisplay~AT~ControlPanel~Personalization
CPL_Personalization_NoLockScreenSlideshow
+ LastWrite
@@ -40762,6 +43853,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
text/plain
+ LastWrite
@@ -40805,6 +43897,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
text/plain
phone
+ LastWrite
@@ -40828,6 +43921,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
text/plain
phone
+ LastWrite
@@ -40874,6 +43968,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
ErrorReporting.admx
ErrorReporting~AT~WindowsComponents~CAT_WindowsErrorReporting
WerConsentCustomize_2
+ LastWrite
@@ -40900,6 +43995,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
ErrorReporting.admx
ErrorReporting~AT~WindowsComponents~CAT_WindowsErrorReporting
WerDisable_2
+ LastWrite
@@ -40926,6 +44022,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
ErrorReporting.admx
ErrorReporting~AT~WindowsComponents~CAT_WindowsErrorReporting
PCH_ShowUI
+ LastWrite
@@ -40952,6 +44049,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
ErrorReporting.admx
ErrorReporting~AT~WindowsComponents~CAT_WindowsErrorReporting
WerNoSecondLevelData_2
+ LastWrite
@@ -40978,6 +44076,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
ErrorReporting.admx
ErrorReporting~AT~WindowsComponents~CAT_WindowsErrorReporting
WerDoNotShowUI
+ LastWrite
@@ -41024,6 +44123,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
eventlog.admx
EventLog~AT~WindowsComponents~EventLogCategory~EventLog_Application
Channel_Log_Retention_1
+ LastWrite
@@ -41050,6 +44150,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
eventlog.admx
EventLog~AT~WindowsComponents~EventLogCategory~EventLog_Application
Channel_LogMaxSize_1
+ LastWrite
@@ -41076,6 +44177,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
eventlog.admx
EventLog~AT~WindowsComponents~EventLogCategory~EventLog_Security
Channel_LogMaxSize_2
+ LastWrite
@@ -41102,6 +44204,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
eventlog.admx
EventLog~AT~WindowsComponents~EventLogCategory~EventLog_System
Channel_LogMaxSize_4
+ LastWrite
@@ -41145,6 +44248,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
text/plain
desktop
+ LowestValueMostSecure
@@ -41167,6 +44271,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
text/plain
+ LowestValueMostSecure
@@ -41189,6 +44294,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
text/plain
+ LowestValueMostSecure
@@ -41211,6 +44317,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
text/plain
+ LowestValueMostSecure
@@ -41233,6 +44340,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
text/plain
+ LowestValueMostSecure
@@ -41255,6 +44363,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
text/plain
+ LowestValueMostSecure
@@ -41277,6 +44386,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
text/plain
+ LowestValueMostSecure
@@ -41299,6 +44409,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
text/plain
+ LowestValueMostSecure
@@ -41321,6 +44432,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
text/plain
+ HighestValueMostSecure
@@ -41343,6 +44455,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
text/plain
+ LowestValueMostSecure
@@ -41366,6 +44479,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
text/plain
desktop
+ LowestValueMostSecure
@@ -41389,6 +44503,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
text/plain
desktop
+ LowestValueMostSecure
@@ -41412,6 +44527,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
text/plain
phone
+ LowestValueMostSecure
@@ -41434,6 +44550,50 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
text/plain
+ HighestValueMostSecure
+
+
+
+
+ ExploitGuard
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ ExploitProtectionSettings
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LastWrite
@@ -41476,6 +44636,51 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
text/plain
+ LowestValueMostSecure
+
+
+
+
+ Handwriting
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ PanelDefaultModeDocked
+
+
+
+
+ Specifies whether the handwriting panel comes up floating near the text box or attached to the bottom of the screen
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ LowestValueMostSecure
@@ -41522,6 +44727,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
AddSearchProvider
+ LastWrite
@@ -41548,6 +44754,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
TurnOnActiveXFiltering
+ LastWrite
@@ -41574,6 +44781,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement
AddonManagement_AddOnList
+ LastWrite
@@ -41600,6 +44808,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_PolicyWarnCertMismatch
+ LastWrite
@@ -41626,6 +44835,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~DeleteBrowsingHistory
DBHDisableDeleteOnExit
+ LastWrite
@@ -41652,6 +44862,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage
Advanced_EnableEnhancedProtectedMode
+ LastWrite
@@ -41678,6 +44889,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
EnterpriseModeEnable
+ LastWrite
@@ -41704,6 +44916,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
EnterpriseModeSiteList
+ LastWrite
@@ -41730,10 +44943,11 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures
Advanced_EnableSSL3Fallback
+ LastWrite
- AllowInternetExplorer7PolicyList
+ AllowInternetExplorer7PolicyList
@@ -41756,6 +44970,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~CategoryCompatView
CompatView_UsePolicyList
+ LastWrite
@@ -41782,6 +44997,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~CategoryCompatView
CompatView_IntranetSites
+ LastWrite
@@ -41808,6 +45024,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_PolicyInternetZoneTemplate
+ LastWrite
@@ -41834,6 +45051,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_PolicyIntranetZoneTemplate
+ LastWrite
@@ -41860,6 +45078,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_PolicyLocalMachineZoneTemplate
+ LastWrite
@@ -41886,6 +45105,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_PolicyInternetZoneLockdownTemplate
+ LastWrite
@@ -41912,6 +45132,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_PolicyIntranetZoneLockdownTemplate
+ LastWrite
@@ -41938,6 +45159,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_PolicyLocalMachineZoneLockdownTemplate
+ LastWrite
@@ -41964,6 +45186,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_PolicyRestrictedSitesZoneLockdownTemplate
+ LastWrite
@@ -41990,6 +45213,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetSettings~Advanced~Browsing
UseIntranetSiteForOneWordEntry
+ LastWrite
@@ -42016,6 +45240,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_Zonemaps
+ LastWrite
@@ -42042,6 +45267,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_PolicyTrustedSitesZoneLockdownTemplate
+ LastWrite
@@ -42068,6 +45294,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage
Advanced_InvalidSignatureBlock
+ LastWrite
@@ -42094,6 +45321,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_PolicyRestrictedSitesZoneTemplate
+ LastWrite
@@ -42120,6 +45348,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
EnableSuggestedSites
+ LastWrite
@@ -42146,6 +45375,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_PolicyTrustedSitesZoneTemplate
+ LastWrite
@@ -42172,6 +45402,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage
Advanced_CertificateRevocation
+ LastWrite
@@ -42198,6 +45429,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage
Advanced_DownloadSignatures
+ LastWrite
@@ -42224,6 +45456,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryBinaryBehaviorSecurityRestriction
IESF_PolicyExplorerProcesses_2
+ LastWrite
@@ -42250,6 +45483,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement
DisableFlashInIE
+ LastWrite
@@ -42276,6 +45510,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement
VerMgmtDisable
+ LastWrite
@@ -42300,6 +45535,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
phone
inetres.admx
+ inetres~AT~WindowsComponents~InternetExplorer
+ DisableSafetyFilterOverride
+ LastWrite
@@ -42324,6 +45562,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
phone
inetres.admx
+ inetres~AT~WindowsComponents~InternetExplorer
+ DisableSafetyFilterOverrideForAppRepUnknown
+ LastWrite
@@ -42350,6 +45591,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~DeleteBrowsingHistory
RestrictHistory
+ LastWrite
@@ -42374,6 +45616,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
phone
inetres.admx
+ inetres~AT~WindowsComponents~InternetExplorer
+ AddonManagement_RestrictCrashDetection
+ LastWrite
@@ -42400,10 +45645,11 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
SQM_DisableCEIP
+ LastWrite
- DisableDeletingUserVisitedWebsites
+ DisableDeletingUserVisitedWebsites
@@ -42426,6 +45672,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~DeleteBrowsingHistory
DBHDisableDeleteHistory
+ LastWrite
@@ -42452,6 +45699,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~RSS_Feeds
Disable_Downloading_of_Enclosures
+ LastWrite
@@ -42478,6 +45726,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage
Advanced_SetWinInetProtocols
+ LastWrite
@@ -42504,6 +45753,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
NoFirstRunCustomise
+ LastWrite
@@ -42530,6 +45780,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage
Advanced_DisableFlipAhead
+ LastWrite
@@ -42556,6 +45807,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL
NoCertError
+ LastWrite
@@ -42582,6 +45834,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~CategoryPrivacy
DisableInPrivateBrowsing
+ LastWrite
@@ -42608,6 +45861,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage
Advanced_EnableEnhancedProtectedMode64Bit
+ LastWrite
@@ -42632,6 +45886,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
phone
inetres.admx
+ inetres~AT~WindowsComponents~InternetExplorer
+ RestrictProxy
+ LastWrite
@@ -42658,6 +45915,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
NoSearchProvider
+ LastWrite
@@ -42684,6 +45942,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
SecondaryHomePages
+ LastWrite
@@ -42710,6 +45969,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
Disable_Security_Settings_Check
+ LastWrite
@@ -42736,6 +45996,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
NoUpdateCheck
+ LastWrite
@@ -42762,6 +46023,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~AdvancedPage
Advanced_DisableEPMCompat
+ LastWrite
@@ -42788,6 +46050,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
Security_zones_map_edit
+ LastWrite
@@ -42814,6 +46077,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
Security_options_edit
+ LastWrite
@@ -42840,6 +46104,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement
VerMgmtDisable
+ LastWrite
@@ -42866,6 +46131,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement
VerMgmtDomainAllowlist
+ LastWrite
@@ -42892,6 +46158,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_IncludeUnspecifiedLocalSites
+ LastWrite
@@ -42918,6 +46185,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage
IZ_UNCAsIntranet
+ LastWrite
@@ -42944,6 +46212,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyAccessDataSourcesAcrossDomains_1
+ LastWrite
@@ -42970,6 +46239,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyNotificationBarActiveXURLaction_1
+ LastWrite
@@ -42996,6 +46266,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyNotificationBarDownloadURLaction_1
+ LastWrite
@@ -43022,6 +46293,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyAllowPasteViaScript_1
+ LastWrite
@@ -43048,6 +46320,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyDropOrPasteFiles_1
+ LastWrite
@@ -43074,6 +46347,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyFontDownload_1
+ LastWrite
@@ -43100,10 +46374,11 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyZoneElevationURLaction_1
+ LastWrite
- InternetZoneAllowLoadingOfXAMLFilesWRONG
+ InternetZoneAllowLoadingOfXAMLFiles
@@ -43126,6 +46401,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_Policy_XAML_1
+ LastWrite
@@ -43152,6 +46428,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyUnsignedFrameworkComponentsURLaction_1
+ LastWrite
@@ -43176,8 +46453,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
- IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Intranet
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
+ IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Internet
+ LastWrite
@@ -43202,8 +46480,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
- IZ_PolicyAllowTDCControl_Both_LocalMachine
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
+ IZ_PolicyAllowTDCControl_Both_Internet
+ LastWrite
@@ -43230,6 +46509,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_Policy_WebBrowserControl_1
+ LastWrite
@@ -43254,8 +46534,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
- IZ_PolicyWindowsRestrictionsURLaction_6
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
+ IZ_PolicyWindowsRestrictionsURLaction_1
+ LastWrite
@@ -43282,6 +46563,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_Policy_AllowScriptlets_1
+ LastWrite
@@ -43308,6 +46590,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_Policy_Phishing_1
+ LastWrite
@@ -43334,6 +46617,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_Policy_ScriptStatusBar_1
+ LastWrite
@@ -43360,10 +46644,11 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyUserdataPersistence_1
+ LastWrite
- InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG1
+ InternetZoneDoNotRunAntimalwareAgainstActiveXControls
@@ -43386,32 +46671,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyAntiMalwareCheckingOfActiveXControls_1
-
-
-
- InternetZoneDoNotRunAntimalwareAgainstActiveXControlsWRONG2
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
- phone
- inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
- IZ_PolicyAntiMalwareCheckingOfActiveXControls_3
+ LastWrite
@@ -43436,8 +46696,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
- IZ_PolicyDownloadSignedActiveX_3
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
+ IZ_PolicyDownloadSignedActiveX_1
+ LastWrite
@@ -43464,6 +46725,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyDownloadUnsignedActiveX_1
+ LastWrite
@@ -43488,8 +46750,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
- IZ_PolicyTurnOnXSSFilter_Both_LocalMachine
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
+ IZ_PolicyTurnOnXSSFilter_Both_Internet
+ LastWrite
@@ -43516,6 +46779,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyDragDropAcrossDomainsAcrossWindows_Both_Internet
+ LastWrite
@@ -43542,6 +46806,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyDragDropAcrossDomainsWithinWindow_Both_Internet
+ LastWrite
@@ -43568,6 +46833,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyMimeSniffingURLaction_1
+ LastWrite
@@ -43592,8 +46858,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
- IZ_Policy_TurnOnProtectedMode_2
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
+ IZ_Policy_TurnOnProtectedMode_1
+ LastWrite
@@ -43620,6 +46887,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_Policy_LocalPathForUpload_1
+ LastWrite
@@ -43646,36 +46914,11 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyScriptActiveXNotMarkedSafe_1
+ LastWrite
- InternetZoneInitializeAndScriptActiveXControlsNotMarkedSafe
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
- phone
- inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
- IZ_PolicyScriptActiveXNotMarkedSafe_1
-
-
-
- InternetZoneJavaPermissionsWRONG1
+ InternetZoneJavaPermissions
@@ -43698,32 +46941,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyJavaPermissions_1
-
-
-
- InternetZoneJavaPermissionsWRONG2
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
- phone
- inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
- IZ_PolicyJavaPermissions_3
+ LastWrite
@@ -43750,6 +46968,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyLaunchAppsAndFilesInIFRAME_1
+ LastWrite
@@ -43776,6 +46995,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyLogon_1
+ LastWrite
@@ -43802,6 +47022,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyNavigateSubframesAcrossDomains_1
+ LastWrite
@@ -43828,6 +47049,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyUnsignedFrameworkComponentsURLaction_1
+ LastWrite
@@ -43854,6 +47076,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicySignedFrameworkComponentsURLaction_1
+ LastWrite
@@ -43880,6 +47103,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_Policy_UnsafeFiles_1
+ LastWrite
@@ -43906,6 +47130,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyBlockPopupWindows_1
+ LastWrite
@@ -43932,6 +47157,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
IZ_PolicyZoneElevationURLaction_1
+ LastWrite
@@ -43958,6 +47184,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
IZ_PolicyAccessDataSourcesAcrossDomains_3
+ LastWrite
@@ -43984,6 +47211,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
IZ_PolicyNotificationBarActiveXURLaction_3
+ LastWrite
@@ -44010,6 +47238,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
IZ_PolicyNotificationBarDownloadURLaction_3
+ LastWrite
@@ -44036,6 +47265,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
IZ_PolicyFontDownload_3
+ LastWrite
@@ -44062,6 +47292,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
IZ_PolicyZoneElevationURLaction_3
+ LastWrite
@@ -44088,6 +47319,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
IZ_PolicyUnsignedFrameworkComponentsURLaction_3
+ LastWrite
@@ -44114,6 +47346,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
IZ_Policy_AllowScriptlets_3
+ LastWrite
@@ -44140,6 +47373,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
IZ_Policy_Phishing_3
+ LastWrite
@@ -44166,6 +47400,34 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
IZ_PolicyUserdataPersistence_3
+ LastWrite
+
+
+
+ IntranetZoneDoNotRunAntimalwareAgainstActiveXControls
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ inetres.admx
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
+ IZ_PolicyAntiMalwareCheckingOfActiveXControls_3
+ LastWrite
@@ -44192,6 +47454,61 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
IZ_PolicyScriptActiveXNotMarkedSafe_3
+ LastWrite
+
+
+
+ IntranetZoneInitializeAndScriptActiveXControlsNotMarkedSafe
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ inetres.admx
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
+ IZ_PolicyScriptActiveXNotMarkedSafe_3
+ LastWrite
+
+
+
+ IntranetZoneJavaPermissions
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ inetres.admx
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
+ IZ_PolicyJavaPermissions_3
+ LastWrite
@@ -44218,6 +47535,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone
IZ_PolicyNavigateSubframesAcrossDomains_3
+ LastWrite
@@ -44244,6 +47562,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_PolicyAccessDataSourcesAcrossDomains_9
+ LastWrite
@@ -44270,6 +47589,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_PolicyNotificationBarActiveXURLaction_9
+ LastWrite
@@ -44296,6 +47616,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_PolicyNotificationBarDownloadURLaction_9
+ LastWrite
@@ -44322,6 +47643,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_PolicyFontDownload_9
+ LastWrite
@@ -44348,6 +47670,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_PolicyZoneElevationURLaction_9
+ LastWrite
@@ -44374,6 +47697,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_PolicyUnsignedFrameworkComponentsURLaction_9
+ LastWrite
@@ -44400,6 +47724,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_Policy_AllowScriptlets_9
+ LastWrite
@@ -44426,6 +47751,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_Policy_Phishing_9
+ LastWrite
@@ -44452,6 +47778,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_PolicyUserdataPersistence_9
+ LastWrite
@@ -44476,8 +47803,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZone~IZ_LocalMachineZone
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_PolicyAntiMalwareCheckingOfActiveXControls_9
+ LastWrite
@@ -44504,6 +47832,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_PolicyScriptActiveXNotMarkedSafe_9
+ LastWrite
@@ -44530,6 +47859,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_PolicyJavaPermissions_9
+ LastWrite
@@ -44556,6 +47886,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZone
IZ_PolicyNavigateSubframesAcrossDomains_9
+ LastWrite
@@ -44582,6 +47913,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
IZ_PolicyAccessDataSourcesAcrossDomains_2
+ LastWrite
@@ -44608,6 +47940,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
IZ_PolicyNotificationBarActiveXURLaction_2
+ LastWrite
@@ -44634,6 +47967,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
IZ_PolicyNotificationBarDownloadURLaction_2
+ LastWrite
@@ -44660,6 +47994,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
IZ_PolicyFontDownload_2
+ LastWrite
@@ -44686,6 +48021,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
IZ_PolicyZoneElevationURLaction_2
+ LastWrite
@@ -44712,6 +48048,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
IZ_PolicyUnsignedFrameworkComponentsURLaction_2
+ LastWrite
@@ -44738,6 +48075,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
IZ_Policy_AllowScriptlets_2
+ LastWrite
@@ -44764,6 +48102,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
IZ_Policy_Phishing_2
+ LastWrite
@@ -44790,6 +48129,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
IZ_PolicyUserdataPersistence_2
+ LastWrite
@@ -44816,6 +48156,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
IZ_PolicyScriptActiveXNotMarkedSafe_2
+ LastWrite
@@ -44842,6 +48183,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
IZ_PolicyJavaPermissions_2
+ LastWrite
@@ -44868,6 +48210,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZoneLockdown
IZ_PolicyNavigateSubframesAcrossDomains_2
+ LastWrite
@@ -44894,6 +48237,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown
IZ_PolicyAccessDataSourcesAcrossDomains_4
+ LastWrite
@@ -44920,6 +48264,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown
IZ_PolicyNotificationBarActiveXURLaction_4
+ LastWrite
@@ -44946,6 +48291,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown
IZ_PolicyNotificationBarDownloadURLaction_4
+ LastWrite
@@ -44972,6 +48318,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown
IZ_PolicyFontDownload_4
+ LastWrite
@@ -44998,6 +48345,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown
IZ_PolicyZoneElevationURLaction_4
+ LastWrite
@@ -45024,6 +48372,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown
IZ_PolicyUnsignedFrameworkComponentsURLaction_4
+ LastWrite
@@ -45050,6 +48399,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown
IZ_Policy_AllowScriptlets_4
+ LastWrite
@@ -45076,6 +48426,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown
IZ_Policy_Phishing_4
+ LastWrite
@@ -45102,6 +48453,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown
IZ_PolicyUserdataPersistence_4
+ LastWrite
@@ -45128,6 +48480,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown
IZ_PolicyScriptActiveXNotMarkedSafe_4
+ LastWrite
@@ -45154,6 +48507,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_IntranetZoneLockdown
IZ_PolicyNavigateSubframesAcrossDomains_4
+ LastWrite
@@ -45180,6 +48534,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown
IZ_PolicyAccessDataSourcesAcrossDomains_10
+ LastWrite
@@ -45206,6 +48561,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown
IZ_PolicyNotificationBarActiveXURLaction_10
+ LastWrite
@@ -45232,6 +48588,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown
IZ_PolicyNotificationBarDownloadURLaction_10
+ LastWrite
@@ -45258,6 +48615,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown
IZ_PolicyFontDownload_10
+ LastWrite
@@ -45284,6 +48642,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown
IZ_PolicyZoneElevationURLaction_10
+ LastWrite
@@ -45310,6 +48669,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown
IZ_PolicyUnsignedFrameworkComponentsURLaction_10
+ LastWrite
@@ -45336,6 +48696,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown
IZ_Policy_AllowScriptlets_10
+ LastWrite
@@ -45362,6 +48723,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown
IZ_Policy_Phishing_10
+ LastWrite
@@ -45388,6 +48750,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown
IZ_PolicyUserdataPersistence_10
+ LastWrite
@@ -45414,6 +48777,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown
IZ_PolicyScriptActiveXNotMarkedSafe_10
+ LastWrite
@@ -45440,6 +48804,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown
IZ_PolicyJavaPermissions_10
+ LastWrite
@@ -45466,6 +48831,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_LocalMachineZoneLockdown
IZ_PolicyNavigateSubframesAcrossDomains_10
+ LastWrite
@@ -45492,6 +48858,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown
IZ_PolicyAccessDataSourcesAcrossDomains_8
+ LastWrite
@@ -45518,6 +48885,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown
IZ_PolicyNotificationBarActiveXURLaction_8
+ LastWrite
@@ -45544,6 +48912,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown
IZ_PolicyNotificationBarDownloadURLaction_8
+ LastWrite
@@ -45570,6 +48939,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown
IZ_PolicyFontDownload_8
+ LastWrite
@@ -45596,6 +48966,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown
IZ_PolicyZoneElevationURLaction_8
+ LastWrite
@@ -45622,6 +48993,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown
IZ_PolicyUnsignedFrameworkComponentsURLaction_8
+ LastWrite
@@ -45648,6 +49020,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown
IZ_Policy_AllowScriptlets_8
+ LastWrite
@@ -45674,6 +49047,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown
IZ_Policy_Phishing_8
+ LastWrite
@@ -45700,6 +49074,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown
IZ_PolicyUserdataPersistence_8
+ LastWrite
@@ -45726,6 +49101,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown
IZ_PolicyScriptActiveXNotMarkedSafe_8
+ LastWrite
@@ -45752,6 +49128,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown
IZ_PolicyJavaPermissions_8
+ LastWrite
@@ -45778,6 +49155,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZoneLockdown
IZ_PolicyNavigateSubframesAcrossDomains_8
+ LastWrite
@@ -45804,6 +49182,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
IZ_PolicyAccessDataSourcesAcrossDomains_6
+ LastWrite
@@ -45830,6 +49209,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
IZ_PolicyNotificationBarActiveXURLaction_6
+ LastWrite
@@ -45856,6 +49236,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
IZ_PolicyNotificationBarDownloadURLaction_6
+ LastWrite
@@ -45882,6 +49263,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
IZ_PolicyFontDownload_6
+ LastWrite
@@ -45908,6 +49290,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
IZ_PolicyZoneElevationURLaction_6
+ LastWrite
@@ -45934,6 +49317,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
IZ_PolicyUnsignedFrameworkComponentsURLaction_6
+ LastWrite
@@ -45960,6 +49344,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
IZ_Policy_AllowScriptlets_6
+ LastWrite
@@ -45986,6 +49371,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
IZ_Policy_Phishing_6
+ LastWrite
@@ -46012,6 +49398,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
IZ_PolicyUserdataPersistence_6
+ LastWrite
@@ -46038,6 +49425,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
IZ_PolicyScriptActiveXNotMarkedSafe_6
+ LastWrite
@@ -46064,6 +49452,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
IZ_PolicyJavaPermissions_6
+ LastWrite
@@ -46090,6 +49479,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
IZ_PolicyNavigateSubframesAcrossDomains_6
+ LastWrite
@@ -46116,6 +49506,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryMimeSniffingSafetyFeature
IESF_PolicyExplorerProcesses_6
+ LastWrite
@@ -46142,6 +49533,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryMKProtocolSecurityRestriction
IESF_PolicyExplorerProcesses_3
+ LastWrite
@@ -46168,6 +49560,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryInformationBar
IESF_PolicyExplorerProcesses_10
+ LastWrite
@@ -46192,8 +49585,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
- IZ_PolicyDownloadSignedActiveX_1
+ inetres~AT~WindowsComponents~InternetExplorer
+ Disable_Managing_Safety_Filter_IE9
+ LastWrite
@@ -46220,6 +49614,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
DisablePerUserActiveXInstall
+ LastWrite
@@ -46246,6 +49641,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryProtectionFromZoneElevation
IESF_PolicyAllProcesses_9
+ LastWrite
@@ -46272,6 +49668,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement
VerMgmtDisableRunThisTime
+ LastWrite
@@ -46298,6 +49695,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryRestrictActiveXInstall
IESF_PolicyAllProcesses_11
+ LastWrite
@@ -46324,6 +49722,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyAccessDataSourcesAcrossDomains_7
+ LastWrite
@@ -46348,8 +49747,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
- IZ_PolicyActiveScripting_1
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
+ IZ_PolicyActiveScripting_7
+ LastWrite
@@ -46376,6 +49776,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyNotificationBarActiveXURLaction_7
+ LastWrite
@@ -46402,6 +49803,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyNotificationBarDownloadURLaction_7
+ LastWrite
@@ -46426,8 +49828,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
- IZ_PolicyBinaryBehaviors_1
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
+ IZ_PolicyBinaryBehaviors_7
+ LastWrite
@@ -46454,6 +49857,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyAllowPasteViaScript_7
+ LastWrite
@@ -46480,6 +49884,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyDropOrPasteFiles_7
+ LastWrite
@@ -46504,12 +49909,13 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
- IZ_PolicyFileDownload_1
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
+ IZ_PolicyFileDownload_7
+ LastWrite
- RestrictedSitesZoneAllowFontDownloadsWRONG1
+ RestrictedSitesZoneAllowFontDownloads
@@ -46532,32 +49938,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyFontDownload_7
-
-
-
- RestrictedSitesZoneAllowFontDownloadsWRONG2
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
- phone
- inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
- IZ_PolicyFontDownload_1
+ LastWrite
@@ -46584,6 +49965,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyZoneElevationURLaction_7
+ LastWrite
@@ -46610,6 +49992,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_Policy_XAML_7
+ LastWrite
@@ -46634,8 +50017,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
- IZ_PolicyAllowMETAREFRESH_1
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
+ IZ_PolicyAllowMETAREFRESH_7
+ LastWrite
@@ -46662,6 +50046,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyUnsignedFrameworkComponentsURLaction_7
+ LastWrite
@@ -46688,6 +50073,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Restricted
+ LastWrite
@@ -46714,6 +50100,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyAllowTDCControl_Both_Restricted
+ LastWrite
@@ -46740,6 +50127,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_Policy_WebBrowserControl_7
+ LastWrite
@@ -46766,6 +50154,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyWindowsRestrictionsURLaction_7
+ LastWrite
@@ -46792,6 +50181,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_Policy_AllowScriptlets_7
+ LastWrite
@@ -46818,6 +50208,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_Policy_Phishing_7
+ LastWrite
@@ -46844,6 +50235,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_Policy_ScriptStatusBar_7
+ LastWrite
@@ -46870,6 +50262,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyUserdataPersistence_7
+ LastWrite
@@ -46896,6 +50289,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyAntiMalwareCheckingOfActiveXControls_7
+ LastWrite
@@ -46922,6 +50316,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyDownloadSignedActiveX_7
+ LastWrite
@@ -46948,6 +50343,34 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyDownloadUnsignedActiveX_7
+ LastWrite
+
+
+
+ RestrictedSitesZoneEnableCrossSiteScriptingFilter
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ inetres.admx
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
+ IZ_PolicyTurnOnXSSFilter_Both_Restricted
+ LastWrite
@@ -46974,6 +50397,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyDragDropAcrossDomainsAcrossWindows_Both_Restricted
+ LastWrite
@@ -47000,6 +50424,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyDragDropAcrossDomainsWithinWindow_Both_Restricted
+ LastWrite
@@ -47026,6 +50451,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyMimeSniffingURLaction_7
+ LastWrite
@@ -47052,6 +50478,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_Policy_LocalPathForUpload_7
+ LastWrite
@@ -47078,6 +50505,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyScriptActiveXNotMarkedSafe_7
+ LastWrite
@@ -47104,6 +50532,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyJavaPermissions_7
+ LastWrite
@@ -47130,6 +50559,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyLaunchAppsAndFilesInIFRAME_7
+ LastWrite
@@ -47156,6 +50586,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyLogon_7
+ LastWrite
@@ -47182,6 +50613,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyNavigateSubframesAcrossDomains_7
+ LastWrite
@@ -47206,8 +50638,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
- IZ_PolicyNavigateSubframesAcrossDomains_1
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
+ IZ_PolicyNavigateSubframesAcrossDomains_7
+ LastWrite
@@ -47232,8 +50665,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
- IZ_PolicyRunActiveXControls_1
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
+ IZ_PolicyRunActiveXControls_7
+ LastWrite
@@ -47260,6 +50694,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicySignedFrameworkComponentsURLaction_7
+ LastWrite
@@ -47284,12 +50719,13 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_InternetZone
- IZ_PolicyScriptActiveXMarkedSafe_1
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
+ IZ_PolicyScriptActiveXMarkedSafe_7
+ LastWrite
- RestrictedSitesZoneWRONG
+ RestrictedSitesZoneScriptingOfJavaApplets
@@ -47310,12 +50746,13 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
phone
inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZoneLockdown
- IZ_PolicyScriptingOfJavaApplets_6
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
+ IZ_PolicyScriptingOfJavaApplets_7
+ LastWrite
- RestrictedSitesZoneWRONG2
+ RestrictedSitesZoneShowSecurityWarningForPotentiallyUnsafeFiles
@@ -47338,10 +50775,11 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_Policy_UnsafeFiles_7
+ LastWrite
- RestrictedSitesZoneWRONG3
+ RestrictedSitesZoneTurnOnCrossSiteScriptingFilter
@@ -47364,10 +50802,11 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyTurnOnXSSFilter_Both_Restricted
+ LastWrite
- RestrictedSitesZoneWRONG4
+ RestrictedSitesZoneTurnOnProtectedMode
@@ -47390,10 +50829,11 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_Policy_TurnOnProtectedMode_7
+ LastWrite
- RestrictedSitesZoneWRONG5
+ RestrictedSitesZoneUsePopupBlocker
@@ -47416,6 +50856,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_RestrictedSitesZone
IZ_PolicyBlockPopupWindows_7
+ LastWrite
@@ -47442,6 +50883,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryRestrictFileDownload
IESF_PolicyAllProcesses_12
+ LastWrite
@@ -47468,6 +50910,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_CategoryScriptedWindowSecurityRestrictions
IESF_PolicyAllProcesses_8
+ LastWrite
@@ -47494,10 +50937,11 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
SpecificSearchProvider
+ LastWrite
- SecurityZonesUseOnlyMachineSettings
+ SecurityZonesUseOnlyMachineSettings
@@ -47520,6 +50964,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
Security_HKLM_only
+ LastWrite
@@ -47546,6 +50991,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer
OnlyUseAXISForActiveXInstall
+ LastWrite
@@ -47572,6 +51018,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
IZ_PolicyAccessDataSourcesAcrossDomains_5
+ LastWrite
@@ -47598,6 +51045,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
IZ_PolicyNotificationBarActiveXURLaction_5
+ LastWrite
@@ -47624,6 +51072,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
IZ_PolicyNotificationBarDownloadURLaction_5
+ LastWrite
@@ -47650,6 +51099,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
IZ_PolicyFontDownload_5
+ LastWrite
@@ -47676,6 +51126,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
IZ_PolicyZoneElevationURLaction_5
+ LastWrite
@@ -47702,6 +51153,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
IZ_PolicyUnsignedFrameworkComponentsURLaction_5
+ LastWrite
@@ -47728,6 +51180,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
IZ_Policy_AllowScriptlets_5
+ LastWrite
@@ -47754,6 +51207,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
IZ_Policy_Phishing_5
+ LastWrite
@@ -47780,6 +51234,61 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
IZ_PolicyUserdataPersistence_5
+ LastWrite
+
+
+
+ TrustedSitesZoneDoNotRunAntimalwareAgainstActiveXControls
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ inetres.admx
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
+ IZ_PolicyAntiMalwareCheckingOfActiveXControls_5
+ LastWrite
+
+
+
+ TrustedSitesZoneDontRunAntimalwareProgramsAgainstActiveXControls
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ inetres.admx
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
+ IZ_PolicyAntiMalwareCheckingOfActiveXControls_5
+ LastWrite
@@ -47806,6 +51315,61 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
IZ_PolicyScriptActiveXNotMarkedSafe_5
+ LastWrite
+
+
+
+ TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedAsSafe
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ inetres.admx
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
+ IZ_PolicyScriptActiveXNotMarkedSafe_5
+ LastWrite
+
+
+
+ TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedSafe
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ inetres.admx
+ inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
+ IZ_PolicyScriptActiveXNotMarkedSafe_5
+ LastWrite
@@ -47832,6 +51396,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
IZ_PolicyJavaPermissions_5
+ LastWrite
@@ -47858,58 +51423,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
inetres.admx
inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
IZ_PolicyNavigateSubframesAcrossDomains_5
-
-
-
- TrustedSitesZoneWRONG1
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
- phone
- inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
- IZ_PolicyAntiMalwareCheckingOfActiveXControls_5
-
-
-
- TrustedSitesZoneWRONG2
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
- phone
- inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~InternetCPL~IZ_SecurityPage~IZ_TrustedSitesZone
- IZ_PolicyScriptActiveXNotMarkedSafe_5
+ LastWrite
@@ -47956,6 +51470,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
Kerberos.admx
Kerberos~AT~System~kerberos
ForestSearch
+ LastWrite
@@ -47982,6 +51497,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
Kerberos.admx
Kerberos~AT~System~kerberos
EnableCbacAndArmor
+ LastWrite
@@ -48008,6 +51524,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
Kerberos.admx
Kerberos~AT~System~kerberos
ClientRequireFast
+ LastWrite
@@ -48034,6 +51551,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
Kerberos.admx
Kerberos~AT~System~kerberos
ValidateKDC
+ LastWrite
@@ -48060,6 +51578,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
Kerberos.admx
Kerberos~AT~System~kerberos
MaxTokenSize
+ LastWrite
@@ -48103,6 +51622,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
text/plain
phone
+ LowestValueMostSecure
@@ -48126,6 +51646,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
text/plain
phone
+ LowestValueMostSecure
@@ -48156,9 +51677,9 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
This policy setting prevents users from adding new Microsoft accounts on this computer.
-If you select the "Users can’t add Microsoft accounts" option, users will not be able to create new Microsoft accounts on this computer, switch a local account to a Microsoft account, or connect a domain account to a Microsoft account. This is the preferred option if you need to limit the use of Microsoft accounts in your enterprise.
+If you select the "Users can’t add Microsoft accounts" option, users will not be able to create new Microsoft accounts on this computer, switch a local account to a Microsoft account, or connect a domain account to a Microsoft account. This is the preferred option if you need to limit the use of Microsoft accounts in your enterprise.
-If you select the "Users can’t add or log on with Microsoft accounts" option, existing Microsoft account users will not be able to log on to Windows. Selecting this option might make it impossible for an existing administrator on this computer to log on and manage the system.
+If you select the "Users can’t add or log on with Microsoft accounts" option, existing Microsoft account users will not be able to log on to Windows. Selecting this option might make it impossible for an existing administrator on this computer to log on and manage the system.
If you disable or do not configure this policy (recommended), users will be able to use Microsoft accounts with Windows.
0
@@ -48175,6 +51696,7 @@ If you disable or do not configure this policy (recommended), users will be able
text/plain
phone
+ LastWrite
@@ -48206,7 +51728,8 @@ Default: Disabled.
text/plain
- desktop
+ phone
+ LastWrite
@@ -48233,7 +51756,8 @@ Note: If the Guest account is disabled and the security option Network Access: S
text/plain
- desktop
+ phone
+ LastWrite
@@ -48272,6 +51796,7 @@ It is possible for applications that use remote interactive logons to bypass thi
text/plain
phone
+ LastWrite
@@ -48285,7 +51810,7 @@ It is possible for applications that use remote interactive logons to bypass thi
This security setting determines whether a different account name is associated with the security identifier (SID) for the account Administrator. Renaming the well-known Administrator account makes it slightly more difficult for unauthorized persons to guess this privileged user name and password combination.
Default: Administrator.
-
+ Administrator
@@ -48299,6 +51824,7 @@ Default: Administrator.
text/plain
phone
+ LastWrite
@@ -48312,7 +51838,7 @@ Default: Administrator.
This security setting determines whether a different account name is associated with the security identifier (SID) for the account "Guest." Renaming the well-known Guest account makes it slightly more difficult for unauthorized persons to guess this user name and password combination.
Default: Guest.
-
+ Guest
@@ -48326,6 +51852,131 @@ Default: Guest.
text/plain
phone
+ LastWrite
+
+
+
+ Devices_AllowedToFormatAndEjectRemovableMedia
+
+
+
+
+ Devices: Allowed to format and eject removable media
+
+This security setting determines who is allowed to format and eject removable NTFS media. This capability can be given to:
+
+Administrators
+Administrators and Interactive Users
+
+Default: This policy is not defined and only Administrators have this ability.
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ LastWrite
+
+
+
+ Devices_AllowUndockWithoutHavingToLogon
+
+
+
+
+ Devices: Allow undock without having to log on
+This security setting determines whether a portable computer can be undocked without having to log on. If this policy is enabled, logon is not required and an external hardware eject button can be used to undock the computer. If disabled, a user must log on and have the Remove computer from docking station privilege to undock the computer.
+Default: Enabled.
+
+Caution
+Disabling this policy may tempt users to try and physically remove the laptop from its docking station using methods other than the external hardware eject button. Since this may cause damage to the hardware, this setting, in general, should only be disabled on laptop configurations that are physically securable.
+ 1
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ LastWrite
+
+
+
+ Devices_PreventUsersFromInstallingPrinterDriversWhenConnectingToSharedPrinters
+
+
+
+
+ Devices: Prevent users from installing printer drivers when connecting to shared printers
+
+For a computer to print to a shared printer, the driver for that shared printer must be installed on the local computer. This security setting determines who is allowed to install a printer driver as part of connecting to a shared printer. If this setting is enabled, only Administrators can install a printer driver as part of connecting to a shared printer. If this setting is disabled, any user can install a printer driver as part of connecting to a shared printer.
+
+Default on servers: Enabled.
+Default on workstations: Disabled
+
+Notes
+
+This setting does not affect the ability to add a local printer.
+This setting does not affect Administrators.
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ LastWrite
+
+
+
+ Devices_RestrictCDROMAccessToLocallyLoggedOnUserOnly
+
+
+
+
+ Devices: Restrict CD-ROM access to locally logged-on user only
+
+This security setting determines whether a CD-ROM is accessible to both local and remote users simultaneously.
+
+If this policy is enabled, it allows only the interactively logged-on user to access removable CD-ROM media. If this policy is enabled and no one is logged on interactively, the CD-ROM can be accessed over the network.
+
+Default: This policy is not defined and CD-ROM access is not restricted to the locally logged-on user.
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ LastWrite
@@ -48352,10 +52003,11 @@ Do not display user information (3)
text/plain
phone
+ LastWrite
- Interactivelogon_DoNotDisplayLastSignedIn
+ InteractiveLogon_DoNotDisplayLastSignedIn
@@ -48381,10 +52033,11 @@ Default: Disabled.
text/plain
phone
+ LastWrite
- Interactivelogon_DoNotDisplayUsernameAtSignIn
+ InteractiveLogon_DoNotDisplayUsernameAtSignIn
@@ -48396,7 +52049,7 @@ If this policy is enabled, the username will not be shown.
If this policy is disabled, the username will be shown.
Default: Disabled.
- 0
+ 1
@@ -48410,10 +52063,11 @@ Default: Disabled.
text/plain
phone
+ LastWrite
- Interactivelogon_DoNotRequireCTRLALTDEL
+ InteractiveLogon_DoNotRequireCTRLALTDEL
@@ -48442,6 +52096,7 @@ Default on stand-alone computers: Enabled.
text/plain
phone
+ LastWrite
@@ -48468,6 +52123,8 @@ Default: not enforced.
text/plain
+ phone
+ LastWrite
@@ -48497,6 +52154,8 @@ Default: No message.
text/plain
phone
+ LastWrite
+ 0xF000
@@ -48524,6 +52183,7 @@ Default: No message.
text/plain
phone
+ LastWrite
@@ -48553,6 +52213,7 @@ Default: Disabled.
text/plain
phone
+ LastWrite
@@ -48582,6 +52243,7 @@ Default: Enabled.
text/plain
phone
+ LastWrite
@@ -48611,6 +52273,7 @@ This policy is supported on at least Windows Server 2016.
text/plain
phone
+ LastWrite
@@ -48636,6 +52299,7 @@ This policy will be turned off by default on domain joined machines. This would
text/plain
phone
+ LastWrite
@@ -48663,6 +52327,40 @@ Default: This policy is not defined and automatic administrative logon is not al
text/plain
phone
+ LastWrite
+
+
+
+ Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn
+
+
+
+
+ Shutdown: Allow system to be shut down without having to log on
+
+This security setting determines whether a computer can be shut down without having to log on to Windows.
+
+When this policy is enabled, the Shut Down command is available on the Windows logon screen.
+
+When this policy is disabled, the option to shut down the computer does not appear on the Windows logon screen. In this case, users must be able to log on to the computer successfully and have the Shut down the system user right before they can perform a system shutdown.
+
+Default on workstations: Enabled.
+Default on servers: Disabled.
+ 1
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ LastWrite
@@ -48694,6 +52392,7 @@ Default: Disabled.
text/plain
phone
+ LastWrite
@@ -48706,10 +52405,10 @@ Default: Disabled.
This policy setting controls whether User Interface Accessibility (UIAccess or UIA) programs can automatically disable the secure desktop for elevation prompts used by a standard user.
-• Enabled: UIA programs, including Windows Remote Assistance, automatically disable the secure desktop for elevation prompts. If you do not disable the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting, the prompts appear on the interactive user's desktop instead of the secure desktop.
+• Enabled: UIA programs, including Windows Remote Assistance, automatically disable the secure desktop for elevation prompts. If you do not disable the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting, the prompts appear on the interactive user's desktop instead of the secure desktop.
-• Disabled: (Default) The secure desktop can be disabled only by the user of the interactive desktop or by disabling the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting.
- 1
+• Disabled: (Default) The secure desktop can be disabled only by the user of the interactive desktop or by disabling the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting.
+ 0
@@ -48723,6 +52422,7 @@ This policy setting controls whether User Interface Accessibility (UIAccess or U
text/plain
phone
+ LastWrite
@@ -48737,18 +52437,18 @@ This policy setting controls the behavior of the elevation prompt for administra
The options are:
-• Elevate without prompting: Allows privileged accounts to perform an operation that requires elevation without requiring consent or credentials. Note: Use this option only in the most constrained environments.
+• Elevate without prompting: Allows privileged accounts to perform an operation that requires elevation without requiring consent or credentials. Note: Use this option only in the most constrained environments.
-• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a privileged user name and password. If the user enters valid credentials, the operation continues with the user's highest available privilege.
+• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a privileged user name and password. If the user enters valid credentials, the operation continues with the user's highest available privilege.
-• Prompt for consent on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.
+• Prompt for consent on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.
-• Prompt for credentials: When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
+• Prompt for credentials: When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
-• Prompt for consent: When an operation requires elevation of privilege, the user is prompted to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.
+• Prompt for consent: When an operation requires elevation of privilege, the user is prompted to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.
-• Prompt for consent for non-Windows binaries: (Default) When an operation for a non-Microsoft application requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.
- 0
+• Prompt for consent for non-Windows binaries: (Default) When an operation for a non-Microsoft application requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user's highest available privilege.
+ 5
@@ -48762,6 +52462,7 @@ The options are:
text/plain
phone
+ LastWrite
@@ -48775,12 +52476,12 @@ This policy setting controls the behavior of the elevation prompt for standard u
The options are:
-• Prompt for credentials: (Default) When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
+• Prompt for credentials: (Default) When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
-• Automatically deny elevation requests: When an operation requires elevation of privilege, a configurable access denied error message is displayed. An enterprise that is running desktops as standard user may choose this setting to reduce help desk calls.
+• Automatically deny elevation requests: When an operation requires elevation of privilege, a configurable access denied error message is displayed. An enterprise that is running desktops as standard user may choose this setting to reduce help desk calls.
-• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
- 0
+• Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
+ 3
@@ -48794,6 +52495,39 @@ The options are:
text/plain
phone
+ LastWrite
+
+
+
+ UserAccountControl_DetectApplicationInstallationsAndPromptForElevation
+
+
+
+
+ User Account Control: Detect application installations and prompt for elevation
+
+This policy setting controls the behavior of application installation detection for the computer.
+
+The options are:
+
+Enabled: (Default) When an application installation package is detected that requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
+
+Disabled: Application installation packages are not detected and prompted for elevation. Enterprises that are running standard user desktops and use delegated installation technologies such as Group Policy Software Installation or Systems Management Server (SMS) should disable this policy setting. In this case, installer detection is unnecessary.
+ 1
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ LastWrite
@@ -48808,77 +52542,9 @@ This policy setting enforces public key infrastructure (PKI) signature checks fo
The options are:
-• Enabled: Enforces the PKI certification path validation for a given executable file before it is permitted to run.
+• Enabled: Enforces the PKI certification path validation for a given executable file before it is permitted to run.
-• Disabled: (Default) Does not enforce PKI certification path validation before a given executable file is permitted to run.
- 1
-
-
-
-
-
-
-
-
-
-
- text/plain
-
- phone
-
-
-
- UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations
-
-
-
-
- User Account Control: Only elevate UIAccess applications that are installed in secure locations
-
-This policy setting controls whether applications that request to run with a User Interface Accessibility (UIAccess) integrity level must reside in a secure location in the file system. Secure locations are limited to the following:
-
-- …\Program Files\, including subfolders
-- …\Windows\system32\
-- …\Program Files (x86)\, including subfolders for 64-bit versions of Windows
-
-Note: Windows enforces a public key infrastructure (PKI) signature check on any interactive application that requests to run with a UIAccess integrity level regardless of the state of this security setting.
-
-The options are:
-
-• Enabled: (Default) If an application resides in a secure location in the file system, it runs only with UIAccess integrity.
-
-• Disabled: An application runs with UIAccess integrity even if it does not reside in a secure location in the file system.
- 1
-
-
-
-
-
-
-
-
-
-
- text/plain
-
- phone
-
-
-
- UserAccountControl_RunAllAdministratorsInAdminApprovalMode
-
-
-
-
- User Account Control: Turn on Admin Approval Mode
-
-This policy setting controls the behavior of all User Account Control (UAC) policy settings for the computer. If you change this policy setting, you must restart your computer.
-
-The options are:
-
-• Enabled: (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode.
-
-• Disabled: Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced.
+• Disabled: (Default) Does not enforce PKI certification path validation before a given executable file is permitted to run.
0
@@ -48893,6 +52559,77 @@ The options are:
text/plain
phone
+ LastWrite
+
+
+
+ UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations
+
+
+
+
+ User Account Control: Only elevate UIAccess applications that are installed in secure locations
+
+This policy setting controls whether applications that request to run with a User Interface Accessibility (UIAccess) integrity level must reside in a secure location in the file system. Secure locations are limited to the following:
+
+- …\Program Files\, including subfolders
+- …\Windows\system32\
+- …\Program Files (x86)\, including subfolders for 64-bit versions of Windows
+
+Note: Windows enforces a public key infrastructure (PKI) signature check on any interactive application that requests to run with a UIAccess integrity level regardless of the state of this security setting.
+
+The options are:
+
+• Enabled: (Default) If an application resides in a secure location in the file system, it runs only with UIAccess integrity.
+
+• Disabled: An application runs with UIAccess integrity even if it does not reside in a secure location in the file system.
+ 1
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ LastWrite
+
+
+
+ UserAccountControl_RunAllAdministratorsInAdminApprovalMode
+
+
+
+
+ User Account Control: Turn on Admin Approval Mode
+
+This policy setting controls the behavior of all User Account Control (UAC) policy settings for the computer. If you change this policy setting, you must restart your computer.
+
+The options are:
+
+• Enabled: (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode.
+
+• Disabled: Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced.
+ 1
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ LastWrite
@@ -48907,9 +52644,9 @@ This policy setting controls whether the elevation request prompt is displayed o
The options are:
-• Enabled: (Default) All elevation requests go to the secure desktop regardless of prompt behavior policy settings for administrators and standard users.
+• Enabled: (Default) All elevation requests go to the secure desktop regardless of prompt behavior policy settings for administrators and standard users.
-• Disabled: All elevation requests go to the interactive user's desktop. Prompt behavior policy settings for administrators and standard users are used.
+• Disabled: All elevation requests go to the interactive user's desktop. Prompt behavior policy settings for administrators and standard users are used.
1
@@ -48924,6 +52661,7 @@ The options are:
text/plain
phone
+ LastWrite
@@ -48938,10 +52676,10 @@ This policy setting controls the behavior of Admin Approval Mode for the built-i
The options are:
-• Enabled: The built-in Administrator account uses Admin Approval Mode. By default, any operation that requires elevation of privilege will prompt the user to approve the operation.
+• Enabled: The built-in Administrator account uses Admin Approval Mode. By default, any operation that requires elevation of privilege will prompt the user to approve the operation.
-• Disabled: (Default) The built-in Administrator account runs all applications with full administrative privilege.
- 1
+• Disabled: (Default) The built-in Administrator account runs all applications with full administrative privilege.
+ 0
@@ -48955,6 +52693,7 @@ The options are:
text/plain
phone
+ LastWrite
@@ -48969,9 +52708,9 @@ This policy setting controls whether application write failures are redirected t
The options are:
-• Enabled: (Default) Application write failures are redirected at run time to defined user locations for both the file system and registry.
+• Enabled: (Default) Application write failures are redirected at run time to defined user locations for both the file system and registry.
-• Disabled: Applications that write data to protected locations fail.
+• Disabled: Applications that write data to protected locations fail.
1
@@ -48986,6 +52725,7 @@ The options are:
text/plain
phone
+ LastWrite
@@ -49028,6 +52768,7 @@ The options are:
text/plain
+ LastWrite
@@ -49071,6 +52812,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -49113,6 +52855,7 @@ The options are:
text/plain
+ LastWrite
@@ -49135,6 +52878,7 @@ The options are:
text/plain
+ LastWrite
@@ -49178,6 +52922,7 @@ The options are:
text/plain
desktop
+ LowestValueMostSecure
@@ -49201,6 +52946,7 @@ The options are:
text/plain
desktop
+ LowestValueMostSecure
@@ -49224,6 +52970,7 @@ The options are:
text/plain
desktop
+ LowestValueMostSecure
@@ -49266,6 +53013,7 @@ The options are:
text/plain
+ LastWrite
@@ -49288,6 +53036,7 @@ The options are:
text/plain
+ LastWrite
@@ -49310,6 +53059,7 @@ The options are:
text/plain
+ LastWrite
@@ -49332,6 +53082,7 @@ The options are:
text/plain
+ LastWrite
@@ -49354,6 +53105,7 @@ The options are:
text/plain
+ LastWrite
@@ -49376,6 +53128,7 @@ The options are:
text/plain
+ LastWrite
@@ -49398,6 +53151,7 @@ The options are:
text/plain
+ LastWrite
@@ -49420,6 +53174,7 @@ The options are:
text/plain
+ LastWrite
@@ -49466,6 +53221,7 @@ The options are:
power.admx
Power~AT~System~PowerManagementCat~PowerSleepSettingsCat
AllowStandbyStatesAC_2
+ LastWrite
@@ -49492,6 +53248,7 @@ The options are:
power.admx
Power~AT~System~PowerManagementCat~PowerVideoSettingsCat
VideoPowerDownTimeOutDC_2
+ LastWrite
@@ -49518,6 +53275,7 @@ The options are:
power.admx
Power~AT~System~PowerManagementCat~PowerVideoSettingsCat
VideoPowerDownTimeOutAC_2
+ LastWrite
@@ -49544,6 +53302,7 @@ The options are:
power.admx
Power~AT~System~PowerManagementCat~PowerSleepSettingsCat
DCHibernateTimeOut_2
+ LastWrite
@@ -49570,6 +53329,7 @@ The options are:
power.admx
Power~AT~System~PowerManagementCat~PowerSleepSettingsCat
ACHibernateTimeOut_2
+ LastWrite
@@ -49596,6 +53356,7 @@ The options are:
power.admx
Power~AT~System~PowerManagementCat~PowerSleepSettingsCat
DCPromptForPasswordOnResume_2
+ LastWrite
@@ -49622,6 +53383,7 @@ The options are:
power.admx
Power~AT~System~PowerManagementCat~PowerSleepSettingsCat
ACPromptForPasswordOnResume_2
+ LastWrite
@@ -49648,6 +53410,7 @@ The options are:
power.admx
Power~AT~System~PowerManagementCat~PowerSleepSettingsCat
DCStandbyTimeOut_2
+ LastWrite
@@ -49674,6 +53437,7 @@ The options are:
power.admx
Power~AT~System~PowerManagementCat~PowerSleepSettingsCat
ACStandbyTimeOut_2
+ LastWrite
@@ -49720,6 +53484,7 @@ The options are:
Printing.admx
Printing~AT~ControlPanel~CplPrinters
PointAndPrint_Restrictions_Win7
+ LastWrite
@@ -49746,6 +53511,7 @@ The options are:
Printing2.admx
Printing2~AT~Printers
PublishPrinters
+ LastWrite
@@ -49788,7 +53554,7 @@ The options are:
text/plain
- desktop
+ LowestValueMostSecure
@@ -49812,6 +53578,7 @@ The options are:
text/plain
10.0.10240
+ LowestValueMostSecure
@@ -49834,6 +53601,7 @@ The options are:
text/plain
+ LowestValueMostSecureZeroHasNoLimits
@@ -49856,6 +53624,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -49878,6 +53647,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -49900,6 +53670,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -49922,6 +53694,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -49944,6 +53718,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -49966,6 +53742,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -49988,6 +53765,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50010,6 +53789,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50032,6 +53813,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50054,6 +53837,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -50076,6 +53860,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50098,6 +53884,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50120,6 +53908,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50142,6 +53932,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -50164,6 +53955,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50186,6 +53979,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50208,94 +54003,8 @@ The options are:
text/plain
-
-
-
- LetAppsAccessCellularData
-
-
-
-
- This policy setting specifies whether Windows apps can access cellular data.
- 0
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
-
-
- LetAppsAccessCellularData_ForceAllowTheseApps
-
-
-
-
- List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps.
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
-
-
- LetAppsAccessCellularData_ForceDenyTheseApps
-
-
-
-
- List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps.
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
-
-
- LetAppsAccessCellularData_UserInControlOfTheseApps
-
-
-
-
- List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the cellular data privacy setting for the listed apps. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps.
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
+ LastWrite
+ ;
@@ -50318,6 +54027,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -50340,6 +54050,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50362,6 +54074,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50384,6 +54098,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50406,6 +54122,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -50428,6 +54145,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50450,6 +54169,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50472,6 +54193,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50494,6 +54217,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -50516,6 +54240,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50538,6 +54264,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50560,6 +54288,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50582,6 +54312,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -50604,6 +54335,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50626,6 +54359,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50648,6 +54383,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50670,6 +54407,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -50692,6 +54430,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50714,6 +54454,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50736,6 +54478,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50758,6 +54502,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -50780,6 +54525,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50802,6 +54549,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50824,6 +54573,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50846,6 +54597,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -50868,6 +54620,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50890,6 +54644,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50912,6 +54668,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50934,6 +54692,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -50956,6 +54715,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -50978,6 +54739,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -51000,6 +54763,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -51022,6 +54787,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -51044,6 +54810,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -51066,6 +54834,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -51088,6 +54858,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -51110,6 +54882,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -51132,6 +54905,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -51154,6 +54929,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -51176,6 +54953,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -51198,6 +54977,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -51220,6 +55000,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -51242,6 +55024,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -51264,6 +55048,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -51286,6 +55072,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -51308,6 +55095,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -51330,6 +55119,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -51352,6 +55143,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -51374,6 +55167,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -51396,6 +55190,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -51418,6 +55214,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -51440,6 +55238,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -51448,7 +55248,7 @@ The options are:
- This policy setting specifies whether Windows apps can sync with devices.
+ This policy setting specifies whether Windows apps can communicate with unpaired wireless devices.
0
@@ -51462,6 +55262,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -51470,7 +55271,7 @@ The options are:
- List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps.
+ List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will be allowed to communicate with unpaired wireless devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps.
@@ -51484,6 +55285,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -51492,7 +55295,7 @@ The options are:
- List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps.
+ List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps will not be allowed to communicate with unpaired wireless devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps.
@@ -51506,6 +55309,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -51514,7 +55319,7 @@ The options are:
- List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the 'sync with devices' privacy setting for the listed apps. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps.
+ List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the 'Communicate with unpaired wireless devices' privacy setting for the listed apps. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps.
@@ -51528,6 +55333,8 @@ The options are:
text/plain
+ LastWrite
+ ;
@@ -51550,6 +55357,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -51596,6 +55404,7 @@ The options are:
remoteassistance.admx
RemoteAssistance~AT~System~RemoteAssist
RA_Options
+ LastWrite
@@ -51622,6 +55431,7 @@ The options are:
remoteassistance.admx
RemoteAssistance~AT~System~RemoteAssist
RA_Logging
+ LastWrite
@@ -51648,6 +55458,7 @@ The options are:
remoteassistance.admx
RemoteAssistance~AT~System~RemoteAssist
RA_Solicit
+ LastWrite
@@ -51674,6 +55485,7 @@ The options are:
remoteassistance.admx
RemoteAssistance~AT~System~RemoteAssist
RA_Unsolicit
+ LastWrite
@@ -51720,6 +55532,7 @@ The options are:
terminalserver.admx
TerminalServer~AT~WindowsComponents~TS_GP_NODE~TS_TERMINAL_SERVER~TS_CONNECTIONS
TS_DISABLE_CONNECTIONS
+ LastWrite
@@ -51746,6 +55559,7 @@ The options are:
terminalserver.admx
TerminalServer~AT~WindowsComponents~TS_GP_NODE~TS_TERMINAL_SERVER~TS_SECURITY
TS_ENCRYPTION_POLICY
+ LastWrite
@@ -51772,6 +55586,7 @@ The options are:
terminalserver.admx
TerminalServer~AT~WindowsComponents~TS_GP_NODE~TS_TERMINAL_SERVER~TS_REDIRECTION
TS_CLIENT_DRIVE_M
+ LastWrite
@@ -51798,6 +55613,7 @@ The options are:
terminalserver.admx
TerminalServer~AT~WindowsComponents~TS_GP_NODE~TS_CLIENT
TS_CLIENT_DISABLE_PASSWORD_SAVING_2
+ LastWrite
@@ -51824,6 +55640,7 @@ The options are:
terminalserver.admx
TerminalServer~AT~WindowsComponents~TS_GP_NODE~TS_TERMINAL_SERVER~TS_SECURITY
TS_PASSWORD
+ LastWrite
@@ -51850,6 +55667,7 @@ The options are:
terminalserver.admx
TerminalServer~AT~WindowsComponents~TS_GP_NODE~TS_TERMINAL_SERVER~TS_SECURITY
TS_RPC_ENCRYPTION
+ LastWrite
@@ -51896,6 +55714,7 @@ The options are:
WindowsRemoteManagement.admx
WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMClient
AllowBasic_2
+ LastWrite
@@ -51922,6 +55741,7 @@ The options are:
WindowsRemoteManagement.admx
WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService
AllowBasic_1
+ LastWrite
@@ -51946,8 +55766,9 @@ The options are:
phone
WindowsRemoteManagement.admx
- WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService
- AllowCredSSP_1
+ WindowsRemoteManagement~AT~WindowsComponents~WinRMClient
+ AllowCredSSP_2
+ LastWrite
@@ -51973,7 +55794,8 @@ The options are:
phone
WindowsRemoteManagement.admx
WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService
- AllowCredSSP_2
+ AllowCredSSP_1
+ LastWrite
@@ -52000,6 +55822,7 @@ The options are:
WindowsRemoteManagement.admx
WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService
AllowAutoConfig
+ LastWrite
@@ -52026,6 +55849,7 @@ The options are:
WindowsRemoteManagement.admx
WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMClient
AllowUnencrypted_2
+ LastWrite
@@ -52052,6 +55876,7 @@ The options are:
WindowsRemoteManagement.admx
WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService
AllowUnencrypted_1
+ LastWrite
@@ -52078,6 +55903,7 @@ The options are:
WindowsRemoteManagement.admx
WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMClient
DisallowDigest
+ LastWrite
@@ -52102,8 +55928,9 @@ The options are:
phone
WindowsRemoteManagement.admx
- WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService
- DisallowNegotiate_1
+ WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMClient
+ DisallowNegotiate_2
+ LastWrite
@@ -52128,8 +55955,9 @@ The options are:
phone
WindowsRemoteManagement.admx
- WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMClient
- DisallowNegotiate_2
+ WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService
+ DisallowNegotiate_1
+ LastWrite
@@ -52156,6 +55984,7 @@ The options are:
WindowsRemoteManagement.admx
WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService
DisableRunAs
+ LastWrite
@@ -52182,6 +56011,7 @@ The options are:
WindowsRemoteManagement.admx
WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService
CBTHardeningLevel_1
+ LastWrite
@@ -52208,6 +56038,7 @@ The options are:
WindowsRemoteManagement.admx
WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMClient
TrustedHosts
+ LastWrite
@@ -52234,6 +56065,7 @@ The options are:
WindowsRemoteManagement.admx
WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService
HttpCompatibilityListener
+ LastWrite
@@ -52260,6 +56092,7 @@ The options are:
WindowsRemoteManagement.admx
WindowsRemoteManagement~AT~WindowsComponents~WinRM~WinRMService
HttpsCompatibilityListener
+ LastWrite
@@ -52306,6 +56139,7 @@ The options are:
rpc.admx
RPC~AT~System~Rpc
RpcRestrictRemoteClients
+ LastWrite
@@ -52332,6 +56166,7 @@ The options are:
rpc.admx
RPC~AT~System~Rpc
RpcEnableAuthEpResolution
+ LastWrite
@@ -52378,6 +56213,7 @@ The options are:
WindowsRemoteShell.admx
WindowsRemoteShell~AT~WindowsComponents~WinRS
AllowRemoteShellAccess
+ LastWrite
@@ -52404,6 +56240,7 @@ The options are:
WindowsRemoteShell.admx
WindowsRemoteShell~AT~WindowsComponents~WinRS
MaxConcurrentUsers
+ LastWrite
@@ -52430,6 +56267,7 @@ The options are:
WindowsRemoteShell.admx
WindowsRemoteShell~AT~WindowsComponents~WinRS
IdleTimeout
+ LastWrite
@@ -52456,6 +56294,7 @@ The options are:
WindowsRemoteShell.admx
WindowsRemoteShell~AT~WindowsComponents~WinRS
MaxMemoryPerShellMB
+ LastWrite
@@ -52482,6 +56321,7 @@ The options are:
WindowsRemoteShell.admx
WindowsRemoteShell~AT~WindowsComponents~WinRS
MaxProcessesPerShell
+ LastWrite
@@ -52508,6 +56348,7 @@ The options are:
WindowsRemoteShell.admx
WindowsRemoteShell~AT~WindowsComponents~WinRS
MaxShellsPerUser
+ LastWrite
@@ -52534,6 +56375,7 @@ The options are:
WindowsRemoteShell.admx
WindowsRemoteShell~AT~WindowsComponents~WinRS
ShellTimeOut
+ LastWrite
@@ -52556,6 +56398,29 @@ The options are:
+
+ AllowCloudSearch
+
+
+
+
+
+ 2
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LowestValueMostSecure
+
+
AllowIndexingEncryptedStoresOrItems
@@ -52576,6 +56441,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -52598,6 +56464,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -52620,6 +56487,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -52642,6 +56510,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -52664,6 +56533,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -52686,6 +56556,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -52708,6 +56579,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -52730,6 +56602,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -52752,6 +56625,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -52774,6 +56648,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -52797,6 +56672,7 @@ The options are:
text/plain
desktop
+ HighestValueMostSecure
@@ -52839,6 +56715,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -52862,6 +56739,7 @@ The options are:
text/plain
desktop
+ LowestValueMostSecure
@@ -52884,6 +56762,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -52907,6 +56786,7 @@ The options are:
text/plain
desktop
+ LowestValueMostSecure
@@ -52930,6 +56810,7 @@ The options are:
text/plain
phone
+ HighestValueMostSecure
@@ -52952,6 +56833,7 @@ The options are:
text/plain
+ LastWrite
@@ -52974,6 +56856,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -52996,6 +56879,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -53018,6 +56902,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -53061,6 +56946,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -53083,6 +56969,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -53105,6 +56992,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -53127,6 +57015,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -53150,6 +57039,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -53173,6 +57063,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -53196,6 +57087,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -53219,6 +57111,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -53241,6 +57134,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -53264,6 +57158,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -53286,6 +57181,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -53308,6 +57204,7 @@ The options are:
text/plain
+ LastWrite
@@ -53351,6 +57248,7 @@ The options are:
text/plain
phone
+ HighestValueMostSecure
@@ -53374,6 +57272,7 @@ The options are:
text/plain
phone
+ HighestValueMostSecure
@@ -53397,6 +57296,7 @@ The options are:
text/plain
phone
+ HighestValueMostSecure
@@ -53439,6 +57339,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -53482,6 +57383,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -53505,6 +57407,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -53528,6 +57431,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -53551,6 +57455,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -53574,6 +57479,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -53597,6 +57503,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -53620,6 +57527,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -53643,6 +57551,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -53666,6 +57575,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -53689,6 +57599,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -53712,6 +57623,7 @@ The options are:
text/plain
phone
+ LastWrite
@@ -53735,6 +57647,7 @@ The options are:
text/plain
phone
+ LastWrite
@@ -53757,6 +57670,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -53780,6 +57694,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -53802,6 +57717,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -53824,6 +57740,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -53847,6 +57764,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -53869,6 +57787,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -53892,6 +57811,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -53915,6 +57835,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -53937,6 +57858,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -53959,6 +57881,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -53981,6 +57904,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -54003,6 +57927,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -54025,6 +57950,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -54047,6 +57973,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -54070,6 +57997,7 @@ The options are:
text/plain
phone
+ LastWrite
@@ -54093,6 +58021,7 @@ The options are:
text/plain
phone
+ HighestValueMostSecure
@@ -54116,6 +58045,7 @@ The options are:
text/plain
phone
+ LastWrite
@@ -54138,6 +58068,30 @@ The options are:
+
+ AllowDiskHealthModelUpdates
+
+
+
+
+
+ 1
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ LastWrite
+
+
EnhancedStorageDevices
@@ -54162,6 +58116,7 @@ The options are:
enhancedstorage.admx
EnhancedStorage~AT~System~EnStorDeviceAccess
TCGSecurityActivationDisabled
+ LastWrite
@@ -54204,6 +58159,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -54226,6 +58182,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -54248,6 +58205,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -54270,6 +58228,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -54292,6 +58251,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -54314,6 +58274,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -54336,6 +58297,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -54358,6 +58320,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -54384,6 +58347,7 @@ The options are:
earlylauncham.admx
EarlyLaunchAM~AT~System~ELAMCategory
POL_DriverLoadPolicy_Name
+ LastWrite
@@ -54392,7 +58356,7 @@ The options are:
- This policy setting lets you prevent apps and features from working with files on OneDrive. If you enable this policy setting: users can’t access OneDrive from the OneDrive app and file picker; Windows Store apps can’t access OneDrive using the WinRT API; OneDrive doesn’t appear in the navigation pane in File Explorer; OneDrive files aren’t kept in sync with the cloud; Users can’t automatically upload photos and videos from the camera roll folder. If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage.
+ This policy setting lets you prevent apps and features from working with files on OneDrive. If you enable this policy setting: users can’t access OneDrive from the OneDrive app and file picker; Windows Store apps can’t access OneDrive using the WinRT API; OneDrive doesn’t appear in the navigation pane in File Explorer; OneDrive files aren’t kept in sync with the cloud; Users can’t automatically upload photos and videos from the camera roll folder. If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage.
0
@@ -54406,6 +58370,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -54432,6 +58397,30 @@ The options are:
systemrestore.admx
SystemRestore~AT~System~SR
SR_DisableSR
+ LastWrite
+
+
+
+ FeedbackHubAlwaysSaveDiagnosticsLocally
+
+
+
+
+ Diagnostic files created when a feedback is filed in the Feedback Hub app will always be saved locally. If this policy is not present or set to false, users will be presented with the option to save locally. The default is to not save locally.
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LastWrite
@@ -54454,6 +58443,7 @@ The options are:
text/plain
+ LastWrite
@@ -54497,6 +58487,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -54520,6 +58511,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -54543,6 +58535,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -54566,6 +58559,7 @@ The options are:
text/plain
phone
+ HighestValueMostSecure
@@ -54589,6 +58583,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -54612,6 +58607,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -54635,6 +58631,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -54657,6 +58654,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -54680,6 +58678,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -54702,6 +58701,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -54725,6 +58725,7 @@ The options are:
text/plain
phone
+ HighestValueMostSecure
@@ -54748,6 +58749,7 @@ The options are:
text/plain
phone
+ HighestValueMostSecure
@@ -54791,6 +58793,7 @@ The options are:
text/plain
desktop
+ LowestValueMostSecure
@@ -54833,6 +58836,7 @@ The options are:
text/plain
+ LastWrite
@@ -54855,6 +58859,7 @@ The options are:
text/plain
+ LastWrite
@@ -54877,6 +58882,7 @@ The options are:
text/plain
+ LastWrite
@@ -54899,6 +58905,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -54921,6 +58928,7 @@ The options are:
text/plain
+ LastWrite
@@ -54944,6 +58952,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -54966,6 +58975,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -54988,6 +58998,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -55010,6 +59021,7 @@ The options are:
text/plain
+ LastWrite
@@ -55032,6 +59044,7 @@ The options are:
text/plain
+ LastWrite
@@ -55054,6 +59067,7 @@ The options are:
text/plain
+ LastWrite
@@ -55076,6 +59090,7 @@ The options are:
text/plain
+ LastWrite
@@ -55098,6 +59113,7 @@ The options are:
text/plain
+ LastWrite
@@ -55120,6 +59136,7 @@ The options are:
text/plain
+ LastWrite
@@ -55142,6 +59159,7 @@ The options are:
text/plain
+ LastWrite
@@ -55164,6 +59182,7 @@ The options are:
text/plain
+ LastWrite
@@ -55186,6 +59205,30 @@ The options are:
text/plain
+ LastWrite
+
+
+
+ DisableDualScan
+
+
+
+
+ Do not allow update deferral policies to cause scans against Windows Update
+ 0
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LastWrite
@@ -55208,6 +59251,7 @@ The options are:
text/plain
+ LastWrite
@@ -55230,6 +59274,7 @@ The options are:
text/plain
+ LastWrite
@@ -55252,6 +59297,7 @@ The options are:
text/plain
+ LastWrite
@@ -55274,6 +59320,7 @@ The options are:
text/plain
+ LastWrite
@@ -55296,6 +59343,7 @@ The options are:
text/plain
+ LastWrite
@@ -55318,6 +59366,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -55340,10 +59389,11 @@ The options are:
text/plain
+ LowestValueMostSecure
- ManageBuildPreview
+ ManagePreviewBuilds
@@ -55362,6 +59412,7 @@ The options are:
text/plain
+ LastWrite
@@ -55384,6 +59435,7 @@ The options are:
text/plain
+ LastWrite
@@ -55406,6 +59458,7 @@ The options are:
text/plain
+ LastWrite
@@ -55428,6 +59481,7 @@ The options are:
text/plain
+ LastWrite
@@ -55450,6 +59504,7 @@ The options are:
text/plain
+ LastWrite
@@ -55472,6 +59527,7 @@ The options are:
text/plain
+ LastWrite
@@ -55494,6 +59550,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -55516,6 +59573,7 @@ The options are:
text/plain
+ LastWrite
@@ -55538,6 +59596,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -55560,6 +59619,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -55582,6 +59642,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -55604,6 +59665,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -55626,6 +59688,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -55648,6 +59711,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -55670,6 +59734,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -55692,6 +59757,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -55714,6 +59780,7 @@ The options are:
text/plain
+ LastWrite
@@ -55736,6 +59803,7 @@ The options are:
text/plain
+ LastWrite
@@ -55758,6 +59826,7 @@ The options are:
text/plain
+ LastWrite
@@ -55780,6 +59849,7 @@ The options are:
text/plain
+ LastWrite
@@ -55802,6 +59872,7 @@ The options are:
text/plain
+ LastWrite
@@ -55825,6 +59896,7 @@ The options are:
text/plain
phone
+ LastWrite
@@ -55867,6 +59939,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -55889,6 +59962,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -55911,6 +59985,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -55933,6 +60008,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -55955,6 +60031,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -55977,6 +60054,7 @@ The options are:
text/plain
+ HighestValueMostSecureZeroHasNoLimits
@@ -56020,6 +60098,7 @@ The options are:
text/plain
phone
+ LastWrite
@@ -56043,6 +60122,7 @@ The options are:
text/plain
phone
+ LastWrite
@@ -56066,6 +60146,7 @@ The options are:
text/plain
phone
+ LastWrite
@@ -56089,6 +60170,7 @@ The options are:
text/plain
phone
+ LastWrite
@@ -56112,6 +60194,7 @@ The options are:
text/plain
phone
+ LastWrite
@@ -56135,6 +60218,7 @@ The options are:
text/plain
phone
+ LastWrite
@@ -56158,6 +60242,7 @@ The options are:
text/plain
phone
+ LastWrite
@@ -56181,6 +60266,7 @@ The options are:
text/plain
phone
+ LastWrite
@@ -56204,6 +60290,7 @@ The options are:
text/plain
phone
+ LastWrite
@@ -56227,6 +60314,7 @@ The options are:
text/plain
phone
+ LastWrite
@@ -56250,6 +60338,7 @@ The options are:
text/plain
phone
+ LastWrite
@@ -56273,6 +60362,7 @@ The options are:
text/plain
phone
+ LastWrite
@@ -56296,6 +60386,7 @@ The options are:
text/plain
phone
+ LastWrite
@@ -56319,6 +60410,7 @@ The options are:
text/plain
phone
+ LastWrite
@@ -56362,6 +60454,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -56385,6 +60478,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -56431,6 +60525,7 @@ The options are:
logon.admx
Logon~AT~System~Logon
DisableLockScreenAppNotifications
+ LastWrite
@@ -56457,6 +60552,7 @@ The options are:
logon.admx
Logon~AT~System~Logon
DontDisplayNetworkSelectionUI
+ LastWrite
@@ -56479,6 +60575,7 @@ The options are:
text/plain
+ HighestValueMostSecure
@@ -56521,6 +60618,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -56543,6 +60641,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -56567,6 +60666,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -56591,6 +60691,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -56616,6 +60717,7 @@ The options are:
text/plain
phone
+ LowestValueMostSecure
@@ -56640,6 +60742,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -56662,6 +60765,7 @@ The options are:
text/plain
+ LowestValueMostSecure
@@ -56686,6 +60790,7 @@ The options are:
text/plain
+ LowestValueMostSecure
diff --git a/windows/client-management/mdm/understanding-admx-backed-policies.md b/windows/client-management/mdm/understanding-admx-backed-policies.md
index f4b6271552..a1cd701480 100644
--- a/windows/client-management/mdm/understanding-admx-backed-policies.md
+++ b/windows/client-management/mdm/understanding-admx-backed-policies.md
@@ -97,7 +97,7 @@ Appv.admx file:
## ADMX-backed policy examples
-The following SyncML examples describe how to set a MDM policy that is defined by an ADMX template, specifically the Publishing_Server2_Policy Group Policy description in the application virtualization ADMX file, appv.admx. Note that the functionality that this Group Policy manages is not important; it is used to illustrate only how an MDM ISV can set an ADMX-backed policy. These SyncML examples illustrate common options and the corresponding SyncML code that can be used for testing your policies. Note that the payload of the SyncML must be XML-encoded; for this XML encoding, you can use the [Coder’s Toolbox](http://coderstoolbox.net/string/#!encoding=xml&action=encode&charset=us_ascii) online tool. To avoid encoding the payload, you can use CData if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
+The following SyncML examples describe how to set a MDM policy that is defined by an ADMX template, specifically the Publishing_Server2_Policy Group Policy description in the application virtualization ADMX file, appv.admx. Note that the functionality that this Group Policy manages is not important; it is used to illustrate only how an MDM ISV can set an ADMX-backed policy. These SyncML examples illustrate common options and the corresponding SyncML code that can be used for testing your policies. Note that the payload of the SyncML must be XML-encoded; for this XML encoding, you can use favorite online tool. To avoid encoding the payload, you can use CData if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
### Enabling a policy
@@ -119,7 +119,7 @@ The following SyncML examples describe how to set a MDM policy that is defined b
**Request SyncML**
```XML
-
+
2
@@ -169,7 +169,7 @@ The following SyncML examples describe how to set a MDM policy that is defined b
**Request SyncML**
```XML
-
+
2
@@ -209,7 +209,7 @@ The following SyncML examples describe how to set a MDM policy that is defined b
**Request SyncML**
```
-
+
1
@@ -292,7 +292,7 @@ The `text` element simply corresponds to a string and correspondingly to an edit
```XML
-
+
$CmdId$
@@ -333,7 +333,7 @@ The `multiText` element simply corresponds to a REG_MULTISZ registry string and
```XML
-
+
2
@@ -377,7 +377,7 @@ Variations of the `list` element are dictated by attributes. These attributes ar
#### Corresponding SyncML:
```XML
-
+
2
@@ -409,7 +409,7 @@ Variations of the `list` element are dictated by attributes. These attributes ar
#### Corresponding SyncML:
```XML
-
+
2
@@ -466,7 +466,7 @@ Variations of the `list` element are dictated by attributes. These attributes ar
#### Corresponding SyncML:
```XML
-
+
2
@@ -503,7 +503,7 @@ Variations of the `list` element are dictated by attributes. These attributes ar
#### Corresponding SyncML:
```XML
-
+
|