Policy Settings for Windows Server 2003 (including SP1) and Windows XP (including SP2)

Size: px
Start display at page:

Download "Policy Settings for Windows Server 2003 (including SP1) and Windows XP (including SP2)"

Transcription

1 Web 2 Policy Settings for (including SP1) and XP (including SP2) This document was written by Conan Kezema. and XP together introduce more than 270 new administrative template policy settings for you to use throughout your Active Directory environment. SP1 and XP SP2 add even more policies to help improve management and security throughout your environment. New Group Policy settings include some of the following categories: Application Compatibility Explorer Management and Security Firewall Terminal Services DNS Configuration Update Quality of Service (QoS) As you browse through the extensive list of policy settings, one of the problems you encounter is trying to figure out what each policy setting can do to make your network administration easier. To display a description of the policy setting, along with operating system or component compatibility information, click the Extended tab in the Group Policy Object Editor:

2 2 Web 2 Policy Settings for (including SP1) and This reference provides information about the new Administrative Template policy settings in and XP. I haven t included every policy setting in, but only those added since If you want a definitive list of all policy settings that can affect both 2000 and machines, you can download a spreadsheet from Microsoft at Microsoft s spreadsheet doesn t go into much detail beyond the Explain Text cell for each policy setting. Therefore, a combination of that document and this reference might be the most useful. Computer Configuration In the Computer Configuration section of the Group Policy Object Editor, you can configure policy settings that affect each computer in the SOM (Scope of Management) of a GPO. A SOM can be a site, a domain, or an OU, as described in Chapter 1. Once you configure a policy setting to apply to the computer, it does not matter who logs on to the computer; each configured policy setting still takes effect. Within the Administrative Templates are four main sections: Components System Network Printers The following sections list and explain the new and XP policy settings. Components The Components section contains categories to assist you in controlling the access and behavior of many built-in services or applications. and XP have added a number of categories, including Explorer, Application Compatibility, IIS Installation, and Terminal Services. To find these policy settings, open the Group Policy Object Editor and browse to Computer Configuration Administrative Templates Components. TABLE 2.1 Explorer Turn off Crash Detection provides the ability to manage the crash detection feature of Add-On Management. Explorer v6.0 in XP SP2 or enabled, a crash in Explorer will invoke Error Reporting. not configured or disabled, the crash detection feature for add-on Management will be enabled.

3 Components 3 TABLE 2.1 Explorer (continued) Do Not Allow Users To Enable Or Disable Add-Ons can be used to manage whether users have the ability to allow or deny add-ons through Add-On Manager. Explorer v6.0 in XP SP2 or enabled, users cannot enable or disable add-ons within Explorer. Note that if the add-on has been specifically entered into the Add-On List policy setting, the user may still manage the add-on through the Add- On Manager. If this policy setting is not configured or disabled, the appropriate controls in the Add- On Manager will be available to users. Turn Off Pop-Up Management provides the ability to manage pop-up management functionality in Explorer. Explorer v6.0 in XP SP2 or enabled, the Control Panel information relating to pop-up management will be grayed-out, and all other notifications and dialog boxes will be unavailable. If this policy setting is not configured or disabled, the pop-up management feature will be functional. Pop-Up Allow List provides the ability to manage a list of websites that will be allowed to open pop-up windows regardless of user settings. Explorer v6.0 in XP SP2 or enabled, you can enter a list of sites that will be allowed to open pop-up windows. If this policy setting is not configured, users will be able to view and edit their own list of sites. disabled, the list is deleted, and users cannot create their own list of sites.

4 4 Web 2 Policy Settings for (including SP1) and TABLE 2.2 Explorer/ Control Panel/Security Page Site to Zone Assignment List Intranet Sites: Include All Local (Intranet) Sites Not Listed In Other Zones provides the ability to assign specific websites to security zones. Each security zone has associated security settings that apply to all the sites assigned to the zone. provides the ability to specify that any local sites that are not specifically mapped into any security zone be forced into the local Intranet Zone. Explorer v6.0 in XP SP2 or Explorer v6.0 in XP SP2 or If you enable this policy setting, you can enter specific websites and assign related zone numbers to each site depending on security requirements. Explorer has four security zones that are numbered 1 4. These zones include: 1. Zone 2. Intranet Zone 3. Trusted Sites Zone 4. Restricted Sites Zone If this policy setting is disabled, any websites listed are deleted and no site-to-zone assignments are permitted. If this policy setting is not configured, users may choose their own site-to-zone assignments. enabled, local sites that are not explicitly assigned to other zones are considered to be in the Intranet Zone. If this policy setting is disabled, local sites that are not explicitly assigned to other zones will not become part of the Intranet Zone, which would automatically configure the site to be linked to the Zone. If this policy setting is not configured, users can choose whether to force local sites into the Intranet Zone.

5 Components 5 TABLE 2.2 Explorer/ Control Panel/Security Page (continued) Intranet Sites: Include All Sites That Bypass The Proxy Server provides the ability to control whether sites that bypass the proxy server are mapped to the local Intranet Zone. Explorer v6.0 in XP SP2 or enabled, sites that bypass the proxy server are automatically assigned to the local Intranet Zone. If this policy setting is disabled, sites that bypass the proxy server may not be mapped to the Intranet Zone depending upon other rules that may apply. If this policy setting is not configured, users can choose whether sites that bypass the proxy server are mapped to the local Intranet Zone. Intranet Sites: Include All Network Paths (UNCs) provides the ability to map network paths to the local Intranet Zone. Explorer v6.0 in XP SP2 or If you enable this policy setting, all network paths (UNCs) are automatically mapped to the local Intranet Zone. If this policy setting is disabled, network paths may not be mapped into the local Intranet Zone, depending upon other rules that may apply. If this policy setting is not configured, users can choose whether network paths are mapped to the Intranet Zone. Zone Template provides the ability to assign the Zone a specific security level. Explorer v6.0 in XP SP2 or enabled, you can assign one of the following security levels to the zone: Low, Medium Low, Medium, High If this policy setting is not configured or disabled, no security level is configured.

6 6 Web 2 Policy Settings for (including SP1) and TABLE 2.2 Explorer/ Control Panel/Security Page (continued) Intranet Zone Template provides the ability to assign the Intranet Zone a specific security level. Explorer v6.0 in XP SP2 or enabled, you can assign one of the following security levels to the zone: Low, Medium Low, Medium, High. If this policy setting is not configured or disabled, no security level is configured. Trusted Sites Zone Template provides the ability to assign the Trusted Sites Zone a specific security level. Explorer v6.0 in XP SP2 or enabled, you can assign one of the following security levels to the zone: Low, Medium Low, Medium, High. If this policy setting is not configured or disabled, no security level is configured. Restricted Sites Zone Template provides the ability to assign the Restricted Sites Zone a specific security level. Explorer v6.0 in XP SP2 or enabled, you can assign one of the following security levels to the zone: Low, Medium Low, Medium, High. If this policy setting is not configured or disabled, no security level is configured. Local Machine Zone Template provides the ability to assign the Local Machine Zone a specific security level. Explorer v6.0 in XP SP2 or enabled, you can assign one of the following security levels to the zone: Low, Medium Low, Medium, High. If this policy setting is not configured or disabled, no security level is configured.

7 Components 7 TABLE 2.2 Explorer/ Control Panel/Security Page (continued) Locked-Down Local Machine Zone Template provides the ability to assign the Locked-Down Local Machine Zone a specific security level. Explorer v6.0 in XP SP2 or enabled, you can assign one of the following security levels to the zone: Low, Medium Low, Medium, High. If this policy setting is not configured or disabled, no security level is configured. Locked-Down Zone Template provides the ability to assign the Locked-Down Zone a specific security level. Explorer v6.0 in XP SP2 or enabled, you can assign one of the following security levels to the zone: Low, Medium Low, Medium, High. If this policy setting is not configured or disabled, no security level is configured. Locked-Down Intranet Zone Template provides the ability to assign the Locked-Down Intranet Zone a specific security level. Explorer v6.0 in XP SP2 or enabled, you can assign one of the following security levels to the zone: Low, Medium Low, Medium, High. If this policy setting is not configured or disabled, no security level is configured. Locked-Down Trusted Sites Zone Template provides the ability to assign the Locked-Down Trusted Sites Zone a specific security level. Explorer v6.0 in XP SP2 or enabled, you can assign one of the following security levels to the zone: Low, Medium Low, Medium, High. If this policy setting is not configured or disabled, no security level is configured.

8 8 Web 2 Policy Settings for (including SP1) and TABLE 2.2 Explorer/ Control Panel/Security Page (continued) Locked-Down Restricted Sites Zone Template provides the ability to assign the Locked-Down Restricted Sites Zone a specific security level. Explorer v6.0 in XP SP2 or enabled, you can assign one of the following security levels to the zone: Low, Medium Low, Medium, High. If this policy setting is not configured or disabled, no security level is configured. TABLE 2.3 The Following Settings Apply to the Zone, Intranet Zone, Trusted Sites Zone, Restricted Sites Zone, and Local Machine Zone Folders Policy Setting Description Applies To Settings and Notes Run.NET Framework- Reliant Components Signed With Authenticode Run.NET Framework- Reliant Components Not Signed With Authenticode provides the ability to manage whether.net Framework components signed with Authenticode can be run from Explorer. provides the ability to manage whether.net Framework components that are not signed with Authenticode can be run from Explorer. Explorer v6.0 in XP SP2 or Explorer v6.0 in XP SP2 or enabled, Explorer will execute signed managed components based upon the following values available in the Run.NET Framework-Reliant Components Signed With Authenticode menu: Enable Will execute signed managed components. Disable Will not execute signed managed components. Prompt Will prompt the user to determine whether to execute signed managed components. If this policy is disabled, Explorer will not execute signed managed components. If this policy is not configured, Explorer will execute signed managed components. enabled, Explorer will execute unsigned managed components based upon the following values available in the Run.NET Framework-Reliant Components Not Signed With Authenticode menu: Enable Will execute unsigned managed components. Disable Will not execute unsigned managed components. Prompt Will prompt the user to determine whether to execute unsigned managed components. If this policy is disabled, Explorer will not execute unsigned managed components. If this policy is not configured, Explorer will execute unsigned managed components.

9 Components 9 TABLE 2.3 The Following Settings Apply to the Zone, Intranet Zone, Trusted Sites Zone, Restricted Sites Zone, and Local Machine Zone Folders (continued) Policy Setting Description Applies To Settings and Notes Download Signed ActiveX Controls Download Unsigned ActiveX Controls provides the ability to control whether a user may download signed ActiveX controls from a page in the zone in which this policy is configured. provides the ability to control whether a user may download unsigned ActiveX controls from a page in the zone in which this policy is configured. Explorer v6.0 in XP SP2 or Explorer v6.0 in XP SP2 or enabled, users can download signed ActiveX controls based upon the following values selected from within the Download Signed Active X Controls menu: Disable Signed ActiveX controls are not downloaded. Enable Signed ActiveX controls are downloaded without user intervention. Prompt Users have a choice whether or not to download controls signed by publishers who are not trusted. Note that code signed by trusted publishers is silently downloaded. not configured, users are prompted whether to download controls signed by untrusted publishers. Note that code signed by trusted publishers is silently downloaded. disabled, signed controls are not downloaded. enabled, users can download unsigned ActiveX controls based upon the following values selected from within the Download Unsigned Active X Controls menu: Disable Unsigned ActiveX controls are not downloaded. Enable Unsigned ActiveX controls are downloaded without user intervention. Prompt Users have a choice whether or not to download unsigned controls. not configured or disabled, users cannot download unsigned controls. Initialize And Script ActiveX Controls Not Marked As Safe provides the ability to manage whether ActiveX controls not marked as safe can run with parameters and scripted. Explorer v6.0 in XP SP2 or enabled, users can initialize and script ActiveX controls not marked as safe based upon the following values selected from within the Initialize And Script Activex Controls Not Marked As Safe menu: Disable Unsafe ActiveX controls are not run. Enable Unsafe ActiveX controls are loaded with parameters or are scripted. Prompt Users have a choice whether to allow a control to be loaded with parameters or scripted. If this policy setting is not configured or disabled, ActiveX controls that cannot be made safe are not loaded with parameters or scripted.

10 10 Web 2 Policy Settings for (including SP1) and TABLE 2.3 The Following Settings Apply to the Zone, Intranet Zone, Trusted Sites Zone, Restricted Sites Zone, and Local Machine Zone Folders (continued) Policy Setting Description Applies To Settings and Notes Run ActiveX Controls And Plugins provides the ability to manage whether ActiveX controls and plugins can run on web pages from the specified zone. Explorer v6.0 in XP SP2 or enabled, ActiveX controls and plug-ins can be run based upon the following value selected in the Run ActiveX Controls And Plugin menu: Administrator Approved If an ActiveX control has been approved by the administrator, it will run without user intervention. Disable ActiveX controls will not run. Enable ActiveX controls will run without user intervention. Prompt Users are asked to choose whether to allow controls or plug-ins to run. disabled, users are prevented from running ActiveX controls. If this policy setting is not configured, ActiveX controls and plug-ins can run without user intervention. Script ActiveX Controls Marked Safe For Scripting provides the ability to manage whether an ActiveX control marked safe for scripting can interact with a script. Explorer v6.0 in XP SP2 or enabled, ActiveX controls marked safe for scripting can interact with a script based upon the following value selected in the Script ActiveX Controls Marked Safe For Scripting menu: Disable ActiveX script interaction is prevented. Enable ActiveX controls will interact with scripts without user intervention. Prompt Users are asked to choose whether to allow script interaction. disabled, script interaction is prevented. If this policy setting is not configured, script interaction can occur without user intervention. Allow File Downloads provides the ability to control file downloads from the zone. Note that this option is determined by the zone of the page with the link attached to the download, not the zone from which the file is delivered. Explorer v6.0 in XP SP2 or enabled, file can be downloaded from the zone. If this policy setting is disabled, files will be prevented from being downloaded from the zone. If this policy setting is not configured, files can be downloaded from the zone.

11 Components 11 TABLE 2.3 The Following Settings Apply to the Zone, Intranet Zone, Trusted Sites Zone, Restricted Sites Zone, and Local Machine Zone Folders (continued) Policy Setting Description Applies To Settings and Notes Allow Font Downloads provides the ability to control whether pages of the zone can download HTML fonts. Explorer v6.0 in XP SP2 or enabled, HTML fonts can be downloaded based upon the value selected in the Allow Font Downloads menu: Disable Fonts will not be able to be downloaded. Enable Font will be downloaded automatically. Prompt Users are asked to choose whether to allow HTML fonts to download. If this policy setting is disabled, HTML fonts are prevented from being downloaded. If this policy setting is not configured, HTML fonts can be downloaded automatically. Java Permissions provides the ability to control permissions for Java applets. Explorer v6.0 in XP SP2 or enabled, you can choose the following options from the Java Permissions menu: Custom Permission settings can be controlled individually for each applet. Disable Java Java applets cannot be run. High Safety Applets run in their own memory space. Low Safety Java applets can perform all operations. disabled, Java applets cannot run. If this policy setting is not configured, the permission is set to High Safety. Access Data Sources Across Domains provides the ability to control whether Explorer can access data from another security zone using Microsoft XML (MSXML) or ActiveX data Objects (ADO). Explorer v6.0 in XP SP2 or enabled, users can load a page in the zone that uses MSXML or ADO to access data from another zone. If this policy setting is not configured or disabled, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone.

12 12 Web 2 Policy Settings for (including SP1) and TABLE 2.3 The Following Settings Apply to the Zone, Intranet Zone, Trusted Sites Zone, Restricted Sites Zone, and Local Machine Zone Folders (continued) Policy Setting Description Applies To Settings and Notes Allow Active Content Over Restricted Protocols To Access My Computer provides the ability to manage whether a resource hosted on an adminrestricted protocol in the Intranet Zone can run active content such as ActiveX, Java, and Binary behaviors. The list of restricted protocols may be set in the Intranet Zone Restricted Protocols section under Network Protocol Lockdown policy. Explorer v6.0 in XP SP2 or enabled, no Intranet Zone content accessed is affected, even for protocols on the restricted list. You can select Prompt from the drop-down menu. An Information Bar appears to allow control over questionable content accessed over any restricted protocols. If this policy setting is disabled, all attempts to access such content over the restricted protocols are blocked. If this policy setting is not configured, the Information Bar will appear to provide the ability to control whether questionable content accessed over any restricted protocols is allowed when the Network Protocol Lockdown security feature is enabled. Automatic Prompting For File Downloads provides the ability to control whether users receive a prompt for non userinitiated file downloads. Note that regardless of this setting, users will still receive standard file download dialog boxes for user-initiated downloads. Explorer v6.0 in XP SP2 or enabled, users will receive a file download dialog box for automatic download attempts. If this policy setting is not configured or disabled, file downloads that are not user-initiated will be blocked and users will see a prompt in the Information Bar. Users can then click the Information Bar to allow the file download prompt.

13 Components 13 TABLE 2.3 The Following Settings Apply to the Zone, Intranet Zone, Trusted Sites Zone, Restricted Sites Zone, and Local Machine Zone Folders (continued) Policy Setting Description Applies To Settings and Notes Automatic Prompting For ActiveX Controls This policy setting provides the ability to control whether users receive a prompt for ActiveX control installations. Explorer v6.0 in XP SP2 or enabled, users will receive a prompt when an attempt to install an ActiveX control takes place. not configured or disabled, ActiveX control installations will be blocked, and users will see a prompt in the Information Bar. Users can then click the Information Bar to allow the ActiveX control prompt. Allow META REFRESH This policy setting provides the ability to control whether a user s browser can be redirected to another Web page if the author of the Web page uses the META REFRESH tag to redirect browsers to alternate websites. Explorer v6.0 in XP SP2 or enabled, a user s browser will be able to be redirected to another web page via the META REFRESH setting. If this policy setting is disabled, a user s browser that loads a page containing an active META REFRESH setting will not be redirected to another web page. not configured, a user s browser can be redirected to another web page. Allow Script- Initiated Without Size Or Position Constraints This policy setting provides the ability to manage restrictions on scriptinitiated popup windows and windows that include title and status bars. Explorer v6.0 in XP SP2 or enabled, Restrictions security will not apply in this zone. not configured or disabled, the possible harmful actions contained in script-initiated pop-up windows cannot be run.

14 14 Web 2 Policy Settings for (including SP1) and TABLE 2.3 The Following Settings Apply to the Zone, Intranet Zone, Trusted Sites Zone, Restricted Sites Zone, and Local Machine Zone Folders (continued) Policy Setting Description Applies To Settings and Notes Allow Binary And Script Behaviors Display Mixed Content provides the ability to manage dynamic binary and script behaviors. provides the ability to manage whether users can display nonsecure items and whether users receive a security information message to display pages containing both secure and nonsecure items. Explorer v6.0 in XP SP2 or Explorer v6.0 in XP SP2 or enabled, binary and script behaviors are available. If Administrator approved is selected in the drop-down menu, only behaviors listed in the Admin-approved Binary Behaviors Security Restriction policy are available. disabled, binary and script behaviors are not available unless applications have implemented a custom security manager. If this policy is not configured, binary and script behaviors are available. enabled, you can select the following values in the Display Mixed Content menu: Disable Users cannot receive the security information message, and nonsecure content cannot be displayed. Enable The user does not receive a security information message, and nonsecure content can be displayed. Prompt The user will receive the security information message on the web pages that contain both secure and nonsecure content. If this policy setting is not configured, the user will receive the security information message on web pages that contain both secure and nonsecure content.

15 Components 15 TABLE 2.3 The Following Settings Apply to the Zone, Intranet Zone, Trusted Sites Zone, Restricted Sites Zone, and Local Machine Zone Folders (continued) Policy Setting Description Applies To Settings and Notes Do Not Prompt For Client Certificate Selection When No Certificates Or Only One Certificate Exists This policy setting provides the ability to manage whether users are prompted to select a certificate when no certificate or only one certificate exists. The prompt will appear if the user attempts to connect to a protected (HTTPS) website. Explorer v6.0 in XP SP2 or enabled, Explorer will not prompt users that have no certificate or only one certificate, with an authentication message when they connect to a protected website. not configured or disabled, Explorer prompts users with an authentication message when they connect to a protected website. Allow Drag And Drop Or Copy And Paste Files Allow Installation Of Desktop Items provides the ability to manage whether users can drag files or copy and paste files from a source within the configured zone. provides the ability to manage whether users can install Active Desktop items from this zone. Explorer v6.0 in XP SP2 or Explorer v6.0 in XP SP2 or enabled, users can drag files or copy and paste files from this zone automatically. You can choose to prompt users to allow a choice to whether to drag or copy files from the zone. disabled, users are prevented from dragging, copying, and pasting files from this zone. If this policy setting is not configured, users can drag, copy, and paste files from this zone automatically. enabled, users can install desktop items from this zone. You can also choose to prompt the user on whether to install desktop items from this zone. If this policy setting is disabled, users are prevented from installing desktop items from this zone. If this policy setting is not configured, users are prompted to choose whether to install desktop items from this zone.

16 16 Web 2 Policy Settings for (including SP1) and TABLE 2.3 The Following Settings Apply to the Zone, Intranet Zone, Trusted Sites Zone, Restricted Sites Zone, and Local Machine Zone Folders (continued) Policy Setting Description Applies To Settings and Notes Launching Applications And Files In An IFRAME Navigate Sub-Frames Across Different Domains Open Files Based On Content, Not File Extension provides the ability to manage whether applications may be run and files may be downloaded from an IFRAME reference in the HTML pages in this specific zone. provides the ability to manage the opening of subframes and access of applications across different domains. provides the ability to manage MIME sniffing for file promotion from one type to another based on a MIME sniff. A MIME sniff is the recognition by Explorer of the file type based on a bit signature. Explorer v6.0 in XP SP2 or Explorer v6.0 in XP SP2 or Explorer v6.0 in XP SP2 or enabled, users will be able to run applications and download files from IFRAMEs on the pages within the zone without user intervention. You can also choose to have users prompted whether to run applications or download files from IFRAMEs. If this policy setting is disabled, users are prevented from launching application and files in an IFRAME. If this policy setting is not configured, users are prompted to choose whether to run applications and download files from IFRAMEs. enabled, users can open subframes from other domains and access applications from other domains. You can also choose to prompt users whether to allow subframes or access applications in other domain. If this policy setting is disabled, users will not be able to open subframes or access applications in different domains. not configured, users can open subframes and access applications from other domains. enabled, the MIME Sniffing Safety Feature will not apply in this zone. If this policy setting is disabled, the actions that may be harmful cannot run. If this policy is not configured, the MIME Sniffing Safety Feature will not apply to this zone.

17 Components 17 TABLE 2.3 The Following Settings Apply to the Zone, Intranet Zone, Trusted Sites Zone, Restricted Sites Zone, and Local Machine Zone Folders (continued) Policy Setting Description Applies To Settings and Notes Software Channel Permissions Submit Non- Encrypted Form Data provides the ability to manage software channel permissions. provides the ability to manage whether data on HTML forms on pages in the zone can be submitted. Note that forms sent with SSL encryption are always allowed. This setting only affects non- SSL for data submission. Explorer v6.0 in XP SP2 or Explorer v6.0 in XP SP2 or enabled, you can choose the following values from the Software Channel Permissions drop-down menu: High Safety Prevents users from being notified of software updates by , software packages from being downloaded to users computers, and software packages from being automatically installed on users computers. Low Safety Allows users to be notified of software updates by , software packages from being downloaded to users computers, and software packages from being automatically installed on users computers. Medium Safety Allows users to be notified of software updates by and software packages from being downloaded to, but not installed on, users computers. disabled, permissions are set to High Safety. If this policy setting is not configured, permissions are set to Medium Safety. enabled, information using HTML forms on pages in this zone can be submitted automatically. You can also choose to prompt users to choose whether to allow HTML forms on pages in this zone to be submitted. If this policy setting is disabled, information using HTML forms on pages in this zone are prevented from being submitted. not configured, users are prompted to choose whether to allow information using HTML forms on pages in this zone to be submitted.

18 18 Web 2 Policy Settings for (including SP1) and TABLE 2.3 The Following Settings Apply to the Zone, Intranet Zone, Trusted Sites Zone, Restricted Sites Zone, and Local Machine Zone Folders (continued) Policy Setting Description Applies To Settings and Notes Use Pop-up Blocker provides the ability to manage whether unwanted pop-up windows appear. Explorer v6.0 in XP SP2 or enabled, most pop-up windows will be prevented from appearing. disabled, pop-up windows are not prevented. not configured, most pop-up windows are prevented from appearing. Userdata Persistence provides the ability to manage the preservation of information in the browser s history, in favorites, in an XML store, or directly within a web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is configured. Explorer v6.0 in XP SP2 or enabled, users can preserve information in the browser s history, in favorites, in an XML store, or directly within a web page saved to disk. disabled, user data persistence does not take place. not configured, users can preserve information in the browser s history, in favorites, in an XML store, or directly within a web page saved to disk. Web Sites In Less Privileged Web Content Zones Can Navigate Into This Zone provides the ability to manage whether websites from less privileged zones can navigate into this zone. Explorer v6.0 in XP SP2 or enabled, websites from less privileged zones, such as the Restricted Zone, can open new windows in, or navigate into, this zone. Note that you can select prompt to provide a warning to the user that potentially risky navigation is about to occur. If this policy setting is disabled, the possibly harmful navigations are prevented. not configured, websites from less privileged zones can open new windows in, or navigate into this zone.

19 Components 19 TABLE 2.3 The Following Settings Apply to the Zone, Intranet Zone, Trusted Sites Zone, Restricted Sites Zone, and Local Machine Zone Folders (continued) Policy Setting Description Applies To Settings and Notes Allow Active Scripting provides the ability to manage whether script code on web pages in the zone is run. Explorer v6.0 in XP SP2 or enabled, script code on pages in the zone can run automatically. If this policy setting is disabled, script code is prevented from running on web pages in the zone. If this policy setting is not configured, script code on web pages within the zone can run automatically. Allow Paste Operations Via Script provides the ability to control whether scripts can perform a Clipboard operation such as cut, copy, or paste. Explorer v6.0 in XP SP2 or enabled, a script will be able to perform a Clipboard operation. If this policy setting is disabled, a script will not be able to perform a Clipboard operation. If this policy setting is not configured, a script will be able to perform a Clipboard operation. Scripting Of Java Applets Logon Options provides the ability to control whether Java applets are exposed to scripts within the zone. provides the ability to control logon options for the zone. Explorer v6.0 in XP SP2 or Explorer v6.0 in XP SP2 or enabled, scripts can access applets automatically without user intervention. disabled, scripts are prevented from accessing Java applets. not configured, scripts can access applets automatically without user intervention. enabled, you can choose the following from the Logon Options menu: Anonymous Logon Used to disable HTTP authentication and uses the guest account only for the Common File System (CIFS) protocol. Automatic Logon Only In Intranet Zone Use to query users for IDs and passwords in other zones. Automatic Logon With Current Username And Password Use to attempt logon using NTLM authentication. Prompt for User Name And Password Used to query users for user IDs and password. If this policy setting is not configured or disabled, logon is set to Automatic Logon Only In The Intranet Zone.

20 20 Web 2 Policy Settings for (including SP1) and TABLE 2.4 The Following Settings Apply to the Locked-Down Zone, Locked- Down Intranet Zone, Locked-Down Trusted Sites Zone, Locked-Down Restricted Sites Zone, and Locked-Down Local Machine Zone folders Policy Setting Description Applies To Settings and Notes Run.NET Framework- Reliant Components Signed With Authenticode provides the ability to manage whether.net Framework components signed with Authenticode can be run from Explorer. Explorer v6.0 in XP SP2 or SP1 or later enabled, Explorer will execute signed managed components based upon the following values available in the Run.NET Framework-Reliant Components Signed With Authenticode menu: Enable Will execute signed managed components. Disable Will not execute signed managed components. Prompt Will prompt the user to determine whether to execute signed managed components. If this policy is disabled, Explorer will not execute signed managed components. If this policy is not configured, Explorer will execute signed managed components. Run.NET Framework- Reliant Components Not Signed With Authenticode provides the ability to manage whether.net Framework components that are not signed with Authenticode can be run from Explorer. Explorer v6.0 in XP SP2 or SP1 or later enabled, Explorer will execute unsigned managed components based upon the following values available in the Run.NET Framework-reliant Components Not Signed With Authenticode menu: Enable Will execute unsigned managed components. Disable Will not execute unsigned managed components. Prompt Will prompt the user to determine whether to execute unsigned managed components. If this policy is disabled, Explorer will not execute unsigned managed components. If this policy is not configured, Explorer will execute unsigned managed components.

21 Components 21 TABLE 2.4 The Following Settings Apply to the Locked-Down Zone, Locked- Down Intranet Zone, Locked-Down Trusted Sites Zone, Locked-Down Restricted Sites Zone, and Locked-Down Local Machine Zone folders (continued) Policy Setting Description Applies To Settings and Notes Download Signed ActiveX Controls Download Unsigned ActiveX Controls provides the ability to control whether a user may download signed ActiveX controls from a page in the zone in which this policy is configured. provides the ability to control whether a user may download unsigned ActiveX controls from a page in the zone in which this policy is configured. Explorer v6.0 in XP SP2 or SP1 or later Explorer v6.0 in XP SP2 or SP1 or later enabled, users can download signed ActiveX controls based upon the following values selected from within the Download Signed Active X Controls menu: Disable Signed ActiveX controls are not downloaded Enable Signed ActiveX controls are downloaded without user intervention. Prompt Users have a choice whether or not to download controls signed by publishers who are not trusted. Note that code signed by trusted publishers are silently downloaded. If this policy setting is not configured, users are prompted whether to download controls signed by untrusted publishers. Note that code signed by trusted publishers is silently downloaded. disabled, signed controls are not downloaded. enabled, users can download unsigned ActiveX controls based upon the following values selected from within the Download Unsigned Active X Controls menu: Disable Unsigned ActiveX controls are not downloaded. Enable Unsigned ActiveX controls are downloaded without user intervention. Prompt Users have a choice whether or not to download unsigned controls. not configured or disabled, users cannot download unsigned controls.

22 22 Web 2 Policy Settings for (including SP1) and TABLE 2.4 The Following Settings Apply to the Locked-Down Zone, Locked- Down Intranet Zone, Locked-Down Trusted Sites Zone, Locked-Down Restricted Sites Zone, and Locked-Down Local Machine Zone folders (continued) Policy Setting Description Applies To Settings and Notes Initialize And Script ActiveX Controls Not Marked As Safe provides the ability to manage whether ActiveX controls not marked as safe can run with parameters and scripted. Explorer v6.0 in XP SP2 or SP1 or later enabled, users can initialize and script ActiveX controls not marked as safe based upon the following values selected from within the Initialize And Script ActiveX Controls Not Marked As Safe menu: Disable Unsafe ActiveX controls are not run. Enable Unsafe ActiveX controls are loaded with parameters or are scripted. Prompt Users have a choice whether to allow a control to be loaded with parameters or scripted. If this policy setting is not configured or disabled, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. Run ActiveX Controls And Plugins provides the ability to manage whether ActiveX controls and plug-ins can run on web pages from the specified zone. Explorer v6.0 in XP SP2 or SP1 or later enabled, ActiveX controls and plug-ins can be run based upon the following value selected in the Run ActiveX Controls And Plugin menu: Administrator Approved If an ActiveX control has been approved by the administrator, it will run without user intervention. Disable ActiveX controls will not run. Enable ActiveX controls will run without user intervention. Prompt Users are asked to choose whether to allow controls or plug-ins to run. If this policy setting is disabled, users are prevented from running ActiveX controls. not configured, ActiveX controls and plug-ins can run without user intervention.

23 Components 23 TABLE 2.4 The Following Settings Apply to the Locked-Down Zone, Locked- Down Intranet Zone, Locked-Down Trusted Sites Zone, Locked-Down Restricted Sites Zone, and Locked-Down Local Machine Zone folders (continued) Policy Setting Description Applies To Settings and Notes Script ActiveX Controls Marked Safe For Scripting provides the ability to manage whether an ActiveX control marked safe for scripting can interact with a script. Explorer v6.0 in XP SP2 or SP1 or later enabled, ActiveX controls marked safe for scripting can interact with a script based upon the following value selected in the Script ActiveX Controls Marked Safe For Scripting menu: Disable ActiveX script interaction is prevented. Enable ActiveX controls will interact with scripts without user intervention. Prompt Users are asked to choose whether to allow script interaction. disabled, script interaction is prevented. If this policy setting is not configured, script interaction can occur without user intervention. Allow File Downloads provides the ability to control file downloads from the zone. Note that this option is determined by the zone of the page with the link attached to the download, not the zone from which the file is delivered. Explorer v6.0 in XP SP2 or SP1 or later enabled, file can be downloaded from the zone. If this policy setting is disabled, files will be prevented from being downloaded from the zone. If this policy setting is not configured, files can be downloaded from the zone. Allow Font Downloads provides the ability to control whether pages of the zone can download HTML fonts. Explorer v6.0 in XP SP2 or SP1 or later enabled, HTML fonts can be downloaded based upon the value selected in the Allow Font Downloads menu: Disable Fonts will not be able to be downloaded. Enable Font will be downloaded automatically. Prompt Users are asked to choose whether to allow HTML fonts to download. If this policy setting is disabled, HTML fonts are prevented from being downloaded. not configured, HTML fonts can be downloaded automatically.

24 24 Web 2 Policy Settings for (including SP1) and TABLE 2.4 The Following Settings Apply to the Locked-Down Zone, Locked- Down Intranet Zone, Locked-Down Trusted Sites Zone, Locked-Down Restricted Sites Zone, and Locked-Down Local Machine Zone folders (continued) Policy Setting Description Applies To Settings and Notes Java Permissions provides the ability to control permissions for java applets. Explorer v6.0 in XP SP2 or SP1 or later enabled, you can choose the following options from the Java Permissions menu: Custom Permission settings can be controlled individually for each applet. Disable Java Java applets cannot be run. High Safety Applets run in their own memory space. Low Safety Java applets can perform all operations. If this policy setting is disabled, Java applets cannot run. If this policy setting is not configured, the permission is set to High Safety. Access Data Sources Across Domains Automatic Prompting For File Downloads provides the ability to control whether Explorer can access data from another security zone using Microsoft XML (MSXML) or ActiveX data Objects (ADO). provides the ability to control whether users receive a prompt for non userinitiated file downloads. Note that regardless of this setting, users will still receive standard file download dialog boxes for user-initiated downloads. Explorer v6.0 in XP SP2 or SP1 or later Explorer v6.0 in XP SP2 or SP1 or later enabled, users can load a page in the zone that uses MSXML or ADO to access data from another zone. If this policy setting is not configured or disabled, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. enabled, users will receive a file download dialog box for automatic download attempts. If this policy setting is not configured or disabled, file downloads that are not userinitiated will be blocked, and users will see a prompt in the Information Bar. Users can then click the Information Bar to allow the file download prompt.

25 Components 25 TABLE 2.4 The Following Settings Apply to the Locked-Down Zone, Locked- Down Intranet Zone, Locked-Down Trusted Sites Zone, Locked-Down Restricted Sites Zone, and Locked-Down Local Machine Zone folders (continued) Policy Setting Description Applies To Settings and Notes Automatic Prompting For ActiveX Controls Allow META REFRESH provides the ability to control whether users receive a prompt for ActiveX control installations. provides the ability to control whether a user s browser can be redirected to another web page if the author of the web page uses the META REFRESH tag to redirect browsers to alternate websites. Explorer v6.0 in XP SP2 or SP1 or later Explorer v6.0 in XP SP2 or SP1 or later enabled, users will receive a prompt when an attempt to install an ActiveX control takes place. not configured or disabled, ActiveX control installations will be blocked, and users will see a prompt in the Information Bar. Users can then click the Information Bar to allow the ActiveX control prompt. enabled, a user s browser will be able to be redirected to another web page via the META REFRESH setting. If this policy setting is disabled, a user s browser that loads a page containing an active META REFRESH setting will not be redirected to another web page. not configured, a user s browser can be redirected to another web page. Allow Script- Initiated Without Size Or Position Constraints provides the ability to manage restrictions on script-initiated pop-up windows and windows that include title and status bars. Explorer v6.0 in XP SP2 or SP1 or later enabled, Restrictions security will not apply in this zone. If this policy setting is not configured or disabled, the possible harmful actions contained in script-initiated pop-up windows cannot be run.

26 26 Web 2 Policy Settings for (including SP1) and TABLE 2.4 The Following Settings Apply to the Locked-Down Zone, Locked- Down Intranet Zone, Locked-Down Trusted Sites Zone, Locked-Down Restricted Sites Zone, and Locked-Down Local Machine Zone folders (continued) Policy Setting Description Applies To Settings and Notes Allow Binary And Script Behaviors Display Mixed Content provides the ability to manage dynamic binary and script behaviors. provides the ability to manage whether users can display nonsecure items and whether users receive a security information message to display pages containing both secure and nonsecure items. Explorer v6.0 in XP SP2 or SP1 or later Explorer v6.0 in XP SP2 or SP1 or later enabled, binary and script behaviors are available. If Administrator Approved is selected in the dropdown menu, only behaviors listed in the Admin-Approved Binary Behaviors Security Restriction policy are available. disabled, binary and script behaviors are not available unless applications have implemented a custom security manager. If this policy is not configured, binary and script behaviors are available. enabled, you can select the following values in the Display Mixed Content menu: Disable Users cannot receive the security information message and nonsecure content cannot be displayed. Enable The user does not receive a security information message and nonsecure content can be displayed. Prompt The user will receive the security information message on the web pages that contain both secure and nonsecure content. not configured, the user will receive the security information message on web pages that contain both secure and nonsecure content. Do Not Prompt For Client Certificate Selection When No Certificates Or Only One Certificate Exists provides the ability to manage whether users are prompted to select a certificate when no certificate or only one certificate exists. The prompt will appear if the user attempts to connect to a protected (HTTPS) website. Explorer v6.0 in XP SP2 or SP1 or later enabled, Explorer will not prompt users that have no certificate or only one certificate, with an authentication message when they connect to a protected website. If this policy setting is not configured or disabled, Explorer prompts users with an authentication message when they connect to a protected website.

27 Components 27 TABLE 2.4 The Following Settings Apply to the Locked-Down Zone, Locked- Down Intranet Zone, Locked-Down Trusted Sites Zone, Locked-Down Restricted Sites Zone, and Locked-Down Local Machine Zone folders (continued) Policy Setting Description Applies To Settings and Notes Allow Drag And Drop Or Copy And Paste Files provides the ability to manage whether users can drag files or copy and paste files from a source within the configured zone. Explorer v6.0 in XP SP2 or SP1 or later enabled, user can drag files or copy and paste files from this zone automatically. You can choose to prompt users to allow a choice to whether to drag or copy files from the zone. If this policy setting is disabled, users are prevented from dragging, copying, and pasting files from this zone. If this policy setting is not configured, users can drag, copy, and paste files from this zone automatically. Allow Installation Of Desktop Items Launching Applications And Files In An IFRAME provides the ability to manage whether users can install Active Desktop items from this zone. provides the ability to manage whether applications may be run and files may be downloaded from an IFRAME reference in the HTML pages in this specific zone. Explorer v6.0 in XP SP2 or SP1 or later Explorer v6.0 in XP SP2 or SP1 or later enabled, users can install desktop items from this zone. You can also choose to prompt the user on whether to install desktop items from this zone. disabled, users are prevented from installing desktop items from this zone. If this policy setting is not configured, users are prompted to choose whether to install desktop items from this zone. enabled, users will be able to run applications and download files from IFRAMEs on the pages within the zone without user intervention. You can also choose to have users prompted whether to run applications or download files from IFRAMEs. disabled, users are prevented from launching application and files in an IFRAME. not configured, users are prompted to choose whether to run applications and download files from IFRAMEs.

28 28 Web 2 Policy Settings for (including SP1) and TABLE 2.4 The Following Settings Apply to the Locked-Down Zone, Locked- Down Intranet Zone, Locked-Down Trusted Sites Zone, Locked-Down Restricted Sites Zone, and Locked-Down Local Machine Zone folders (continued) Policy Setting Description Applies To Settings and Notes Navigate Sub-Frames Across Different Domains Open Files Based On Content, Not File Extension provides the ability to manage the opening of subframes and access of applications across different domains. provides the ability to manage MIME sniffing for file promotion from one type to another based on a MIME sniff. A MIME sniff is the recognition by Explorer of the file type based on a bit signature. Explorer v6.0 in XP SP2 or SP1 or later Explorer v6.0 in XP SP2 or SP1 or later enabled, users can open subframes from other domains and access applications from other domains. You can also choose to prompt users whether to allow subframes or access applications in other domain. disabled, users will not be able to open subframes or access applications in different domains. If this policy setting is not configured, users can open subframes and access applications from other domains. enabled, the MIME Sniffing Safety Feature will not apply in this zone. If this policy setting is disabled, the actions that may be harmful cannot run. If this policy is not configured, the MIME Sniffing Safety Feature will not apply to this zone.

QuestionPoint chat The Guide to IE browser setup Last updated: 2009 June 23

QuestionPoint chat The Guide to IE browser setup Last updated: 2009 June 23 QuestionPoint chat The Guide to IE browser setup Last updated: 2009 June 23 This guide provides a procedure for initially configuring your Internet Explorer (IE) browser to use Flash Chat. Note: If you

More information

QuestionPoint chat The Guide to IE browser setup Last updated: 2013 Nov 12

QuestionPoint chat The Guide to IE browser setup Last updated: 2013 Nov 12 QuestionPoint chat The Guide to IE browser setup Last updated: 2013 Nov 12 This guide provides a procedure for initially configuring your Internet Explorer (IE) browser to use Flash Chat. Please note that

More information

PRE-REQUISITES. The following software are the pre-requisites for functioning of SRM.

PRE-REQUISITES. The following software are the pre-requisites for functioning of SRM. PRE-REQUISITES A. SOFTWARE The following software are the pre-requisites for functioning of SRM. Recommended OS: Windows 7 SP1 and above. Note: (Windows XP is not recommended) Recommended Browser: Internet

More information

3/20/ :47:14 AM 12/13/ :05:38 AM

3/20/ :47:14 AM 12/13/ :05:38 AM Policy Data collected on: 12/19/2012 12:10:47 PM General Details Domain Owner Created Modified User Revisions Computer Revisions 3/20/2008 10:47:14 AM 12/13/2012 11:05:38 AM 175 (AD), 175 (sysvol) 66 (AD),

More information

Training Quick Steps Internet Explorer (v7) Settings. Adding Your URL as a Trusted Site

Training Quick Steps Internet Explorer (v7) Settings. Adding Your URL as a Trusted Site Adding Your URL as a Trusted Site In order to access PrognoCIS, you must add your URL as a Trusted Site, which will enable the Security Certificate to allow you to access the secured web site. Refer to

More information

System Requirements. Server and Client Requirements of Xpert.NET

System Requirements. Server and Client Requirements of Xpert.NET System Requirements Server and Client Requirements of Xpert.NET Table of Contents 1 Introduction 3 2 Server Requirements 4 2.1 Hardware....................................... 4 2.1.1 Hardware Requirements...........................

More information

CPD Online System Requirements and Browser Settings

CPD Online System Requirements and Browser Settings CPD Online System Requirements and Browser Settings Browser & Operating System Compatibility Matrix IE 11.0 1 Edge 1 Firefox 51 Chrome 56 Safari 8.0.7 Safari 9.1.2 Safari 10.0 Supported Operating Systems

More information

Qvidian Proposal Automation System Requirements

Qvidian Proposal Automation System Requirements Qvidian Proposal Automation System Requirements Version 11.0.6-10/13/2017 Copyright Copyright 2017 Qvidian. All rights reserved. Information in this document is subject to change without notice. The software

More information

Data Warehouse: User Computer Configuration Guide

Data Warehouse: User Computer Configuration Guide University of Texas at San Antonio Data Warehouse: User Computer Configuration Guide Sponsored by the Vice Provost of Institutional Effectiveness DOCUMENT HISTORY This is an on-line document. Paper copies

More information

Using VPN. DJJ Staff

Using VPN. DJJ Staff Using VPN DJJ Staff 1 Internet Explorer (32-bit) Enter https://vpn.djj.state.fl.us in the address bar You will need to use IE-32bit. 64-bit machines have the IE 64-bit option as well. To check this setting

More information

Browser Configuration Reference

Browser Configuration Reference Sitecore CMS 7.0 or later Browser Configuration Reference Rev: 2013-09-30 Sitecore CMS 7.0 or later Browser Configuration Reference Optimizing Internet Explorer and other web browsers to work with Sitecore

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0 Administration Guide Published: 2013-01-29 SWD-20130131125552322 Contents 1 Related resources... 18 2 About BlackBerry Enterprise Server

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Update 2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 452330 Revision Date 11 November 2014 Introduction WatchGuard is pleased to announce the release of

More information

CFS Browser Compatibility

CFS Browser Compatibility CFS Browser Compatibility This document outlines the requirements for browsers certified by Oracle, for use with our current version of CFS. The information contained here has been consolidated from documents

More information

Using VPN. Provider Staff

Using VPN. Provider Staff Using VPN Provider Staff 1 Internet Explorer (32-bit) Enter https://vpn.djj.state.fl.us in the address bar You will need to use IE-32bit. 64-bit machines have the IE 64-bit option as well. To check this

More information

Bidder s Guide for submission of online application for allotment of Coal Mines

Bidder s Guide for submission of online application for allotment of Coal Mines Bidder s Guide for submission of online application for allotment of Coal Mines (The following section is meant only to provide guidance to bidders about the bidding process on the website of MSTC. These

More information

Aventail Connect Client with Smart Tunneling

Aventail Connect Client with Smart Tunneling Aventail Connect Client with Smart Tunneling User s Guide Windows v8.9.0 1996-2007 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,

More information

VMware Horizon 7 Administration Training

VMware Horizon 7 Administration Training VMware Horizon 7 Administration Training Course Course Duration : 20 Working Days Class Duration : 3 hours per day Fast Track: - Course duration 10days (Per day 8 hours) Get Fee Details Module 1: Introduction

More information

Onesource Dataflow. Data Provider Guide. Tax & Accounting. Last updated May 2012

Onesource Dataflow. Data Provider Guide. Tax & Accounting. Last updated May 2012 Onesource Dataflow Data Provider Guide Last updated May 2012 Tax & Accounting Copyright 2012 Thomson Reuters/ONESOURCE. All Rights Reserved. Proprietary Materials No use of these Proprietary materials

More information

WORKSTATION SETUP GUIDE FOR ACCESSING THE MIBGAS PLATFORM. Date: 15/12/2016. Version: 4.1 MERCADO IBÉRICO DEL GAS

WORKSTATION SETUP GUIDE FOR ACCESSING THE MIBGAS PLATFORM. Date: 15/12/2016. Version: 4.1 MERCADO IBÉRICO DEL GAS WORKSTATION SETUP GUIDE FOR ACCESSING THE MIBGAS PLATFORM Date: 15/12/2016 Version: 4.1 Alfonso XI, 6. 28014 Madrid (España) www.mibgas.es T (+34) 91 268 26 01 CONTENTS 1 INTRODUCTION 2 2 PRIOR REQUISITES

More information

Instructions for Configuring Your Browser Settings and Online Security FAQ s

Instructions for Configuring Your Browser Settings and Online Security FAQ s Instructions for Configuring Your Browser Settings and Online Security FAQ s General Settings The following browser settings and plug-ins are required to properly access Digital Insight s webbased solutions.

More information

Instructions For Configuring Your Browser Settings and Online Banking FAQ's

Instructions For Configuring Your Browser Settings and Online Banking FAQ's Instructions For Configuring Your Browser Settings and Online Banking FAQ's Instructions By Browser Type Google Chrome Firefox Internet Explorer 8 Internet Explorer 9 Safari Online Banking FAQ's Google

More information

Aventail README ASAP Platform version 8.0

Aventail README ASAP Platform version 8.0 Aventail README 1 Aventail README ASAP Platform version 8.0 Part No. 0850-000010-01 October 19, 2004 This README highlights new features and provides late-breaking information about the Aventail EX-1500

More information

Installation Manual on Intra SSL Service (PC Check)

Installation Manual on Intra SSL Service (PC Check) Installation Manual on Intra SSL Service (PC Check) Note 1) No installation is allowed without administrator authority. Install to an account with administrator authority given. Note 2) The present manual

More information

Using the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1

Using the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1 Using the VMware vcenter Orchestrator Client vrealize Orchestrator 5.5.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

emudhra DOWNLOAD INSTRUCTION MANUAL HARD TOKEN VERSION 3 Date of Publication: 10th November 2011

emudhra DOWNLOAD INSTRUCTION MANUAL HARD TOKEN VERSION 3 Date of Publication: 10th November 2011 emudhra DOWNLOAD INSTRUCTION MANUAL HARD TOKEN VERSION 3 () Date of Publication: 10th November 2011 emudhra Consumer Services Ltd 3rd Floor, Sai Arcade Outer Ring Road Devarabeesanahalli Bangalore 560103

More information

PC Configuration v 6.6 (01 May 2009)

PC Configuration v 6.6 (01 May 2009) A I R M E D I N T E R N A T I O N A L I N T R A N E T D O C U M E N T A T I O N PC Configuration v 6.6 (01 May 2009) There are a variety of requirements and settings that should be made in order for the

More information

How to take up my assessment?

How to take up my assessment? 2011, Cognizant How to take up my assessment? Step 1 : You have to take up the assessment only using the Virtual Desktop Interface (VDI environment) Please use the URL, https://learninglabs.cognizant.com

More information

Republicbank.com Supported Browsers and Settings (Updated 03/12/13)

Republicbank.com Supported Browsers and Settings (Updated 03/12/13) Republicbank.com Supported Browsers and Settings (Updated 03/12/13) We support the Internet Explorer 8.0 & 9.0. If you are using Internet Explorer 7.0 or earlier you will need to update your browser. Click

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page

More information

Administrative Training Mura CMS Version 5.6

Administrative Training Mura CMS Version 5.6 Administrative Training Mura CMS Version 5.6 Published: March 9, 2012 Table of Contents Mura CMS Overview! 6 Dashboard!... 6 Site Manager!... 6 Drafts!... 6 Components!... 6 Categories!... 6 Content Collections:

More information

PROMENU WEB ACCESS GUIDE

PROMENU WEB ACCESS GUIDE Business Office 1150 rue Levis, Suite 201 Terrebonne, QC, J6W 5S6 Toll-free : 866.471.2828 Phone : 450.471.2828 Fax : 450.824.0828 Head Office 10 boulevard de Mortagne, Suite 200 Boucherville, QC, J4B

More information

Taking SAP Contact Center End-User Applications into Use

Taking SAP Contact Center End-User Applications into Use Last updated on: 18.05.2018 Responsible IPK Taking SAP Contact Center End-User Applications into Use Contents 1. Introduction... 3 1.1. Communication Desktop (CDT)... 3 Prerequisites... 3... 4 Limitations

More information

Configuring Windows Security Features

Configuring Windows Security Features 04_0789737213_ch03.qxd 10/26/07 3:31 PM Page 77 3 CHAPTER THREE Configuring Windows Security Features This chapter covers the following objectives: Configure and troubleshoot User Account Control. Configure

More information

Copyright and Trademarks

Copyright and Trademarks Copyright and Trademarks Specops Password Reset is a trademark owned by Specops Software. All other trademarks used and mentioned in this document belong to their respective owners. 2 Contents Key Components

More information

PROCON CONTRACTOR USERS BROWSER SETUP

PROCON CONTRACTOR USERS BROWSER SETUP PROCON CONTRACTOR USERS BROWSER SETUP PP1019-09 / Jan. 2018 AVEVA Solutions Limited High Cross Madingley Road Cambridge CB3 0HB Tel +44 (0)1223 556655 Fax +44 (0)1223 556666 aveva.com PROCON CONTRACTOR

More information

Cisco Unified Serviceability

Cisco Unified Serviceability Cisco Unified Serviceability Introduction, page 1 Installation, page 5 Introduction This document uses the following abbreviations to identify administration differences for these Cisco products: Unified

More information

Introduction to application management

Introduction to application management Introduction to application management To deploy web and mobile applications, add the application from the Centrify App Catalog, modify the application settings, and assign roles to the application to

More information

PROCON COMPANY USERS BROWSER SETUP

PROCON COMPANY USERS BROWSER SETUP PROCON COMPANY USERS BROWSER SETUP PP1018-08 / Nov. 2017 AVEVA Solutions Limited High Cross Madingley Road Cambridge CB3 0HB Tel +44 (0)1223 556655 Fax +44 (0)1223 556666 aveva.com PROCON COMPANY USERS

More information

Schneider Electric License Manager

Schneider Electric License Manager Schneider Electric License Manager EIO0000001070 11/2012 Schneider Electric License Manager User Manual 12/2012 EIO0000001070.01 www.schneider-electric.com The information provided in this documentation

More information

DigitalPersona Pro Enterprise

DigitalPersona Pro Enterprise DigitalPersona Pro Enterprise Quick Start Guide Version 5 DATA PROTECTION REMOTE ACCESS SECURE COMMUNICATION STRONG AUTHENTICATION ACCESS RECOVERY SINGLE SIGN-ON DigitalPersona Pro Enterprise DigitalPersona

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 8.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Using the VMware vrealize Orchestrator Client

Using the VMware vrealize Orchestrator Client Using the VMware vrealize Orchestrator Client vrealize Orchestrator 7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Schneider Electric Floating License Manager

Schneider Electric Floating License Manager Schneider Electric Floating License Manager EIO0000001078 11/2012 Schneider Electric Floating License Manager User Manual 12/2012 EIO0000001078.01 www.schneider-electric.com The information provided in

More information

Transport Gateway Installation / Registration / Configuration

Transport Gateway Installation / Registration / Configuration CHAPTER 4 Transport Gateway Installation / Registration / Configuration This chapter covers the following areas: Transport Gateway requirements. Security Considerations When Using a Transport Gateway.

More information

Exam Questions

Exam Questions Exam Questions 70-685 Pro: Windows 7, Enterprise Desktop Support Technician https://www.2passeasy.com/dumps/70-685/ 1.Portable computer users report that they can use Internet Explorer to browse Internet

More information

POWER EGG2.0 Ver.2.5 Initial Manual (English version)

POWER EGG2.0 Ver.2.5 Initial Manual (English version) POWER EGG2.0 Ver.2.5 Initial Manual (English version) Copyright 2013 D-CIRCLE,INC. All Rights Reserved 2013.01 Introduction This document explains about the browser setup and login that are used in POWER

More information

School Installation Guide ELLIS Academic 5.2.6

School Installation Guide ELLIS Academic 5.2.6 ELLIS Academic 5.2.6 This document was last updated on 2/16/11. or one or more of its direct or indirect affiliates. All rights reserved. ELLIS is a registered trademark, in the U.S. and/or other countries,

More information

PROXY Pro Web Console Operations v10.0. User Guide October 2017

PROXY Pro Web Console Operations v10.0. User Guide October 2017 PROXY Pro Web Console Operations v10.0 User Guide October 2017 Table of contents 1. Intro and Overview...5 Web Console Landing Page...6 Definitions...7 Account Users...9 Common Header Fields...10 Menu

More information

Configuring Remote Access using the RDS Gateway

Configuring Remote Access using the RDS Gateway Configuring Remote Access using the RDS Gateway Author: AC, SNE Contents Introduction... 3 Pre-requisites... 3 Supported Operating Systems... 3 Installing the I.T. Services Certificate Authority Root Certificate...

More information

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1 Aspera Connect 2.6.3 Windows XP, 2003, Vista, 2008, 7 Document Version: 1 2 Contents Contents Introduction... 3 Setting Up... 4 Upgrading from a Previous Version...4 Installation... 4 Set Up Network Environment...

More information

BIG-IP Access Policy Manager : Portal Access. Version 12.1

BIG-IP Access Policy Manager : Portal Access. Version 12.1 BIG-IP Access Policy Manager : Portal Access Version 12.1 Table of Contents Table of Contents Overview of Portal Access...7 Overview: What is portal access?...7 About portal access configuration elements...7

More information

Using the vrealize Orchestrator Operations Client. vrealize Orchestrator 7.5

Using the vrealize Orchestrator Operations Client. vrealize Orchestrator 7.5 Using the vrealize Orchestrator Operations Client vrealize Orchestrator 7.5 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Create and Apply Clientless SSL VPN Policies for Accessing. Connection Profile Attributes for Clientless SSL VPN

Create and Apply Clientless SSL VPN Policies for Accessing. Connection Profile Attributes for Clientless SSL VPN Create and Apply Clientless SSL VPN Policies for Accessing Resources, page 1 Connection Profile Attributes for Clientless SSL VPN, page 1 Group Policy and User Attributes for Clientless SSL VPN, page 3

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902 Workspace ONE UEM Certificate Authentication for EAS with ADCS VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

NBC-IG Installation Guide. Version 7.2

NBC-IG Installation Guide. Version 7.2 Installation Guide Version 7.2 2017 Nuance Business Connect 7.2 Installation Guide Document Revision History Revision Date August 8, 2017 Revision List Updated supported SQL Server versions June 14, 2017

More information

Citrix User Guide Version 2.2. Table of Contents. Citrix on a PC... 1

Citrix User Guide Version 2.2. Table of Contents. Citrix on a PC... 1 Citrix User Guide Table of Contents Citrix on a PC... 1 Installing Browser Plug-ins... 1 Notes for Windows XP Service Pack 2 Users... 3 Logging In... 3 Accessing Applications... 4 Logging Off... 6 Citrix

More information

DIRECTORY MANAGER V1.6 Quick Start Guide

DIRECTORY MANAGER V1.6 Quick Start Guide DIRECTORY MANAGER V1.6 Quick Start Guide Directory Manager is an easy-to-use, customizable, Web-based utility that allows the administrator to delegate the ability to update user s information in the Active

More information

Privileged Identity App Launcher and Session Recording

Privileged Identity App Launcher and Session Recording Privileged Identity App Launcher and Session Recording 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property

More information

Avalanche Remote Control User Guide. Version 4.1

Avalanche Remote Control User Guide. Version 4.1 Avalanche Remote Control User Guide Version 4.1 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server

PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server PEAP under Unified Wireless Networks with ACS 5.1 and Windows 2003 Server Document ID: 112175 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Windows

More information

Evaluation Guide Host Access Management and Security Server 12.4 SP1 ( )

Evaluation Guide Host Access Management and Security Server 12.4 SP1 ( ) Evaluation Guide Host Access Management and Security Server 12.4 SP1 (12.4.10) Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Xton Access Manager GETTING STARTED GUIDE

Xton Access Manager GETTING STARTED GUIDE Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3

More information

PROXY Pro Deployment Tool v10.0. User Guide October 2017

PROXY Pro Deployment Tool v10.0. User Guide October 2017 PROXY Pro Deployment Tool v10.0 User Guide October 2017 Table of contents 1. System Requirements...3 2. Target Computer Requirements...4 3. Deployment Tool Operation...5 3.1 Loading a Host Install File...6

More information

Installation on Windows Server 2008

Installation on Windows Server 2008 USER GUIDE MADCAP PULSE 4 Installation on Windows Server 2008 Copyright 2018 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described

More information

Transport Gateway Installation / Registration / Configuration

Transport Gateway Installation / Registration / Configuration CHAPTER 2 Transport Gateway Installation / Registration / Configuration This chapter covers the following areas: Transport Gateway requirements. Security Considerations When Using a Transport Gateway.

More information

Documentation. nfront Web Password Change. Version nfront Security. All Rights Reserved.

Documentation. nfront Web Password Change. Version nfront Security. All Rights Reserved. nfront Web Password Change Version 3.0.0 Documentation 2000 2013 nfront Security. All Rights Reserved. nfront Security, the nfront Security logo and nfront Password Filter are trademarks of Altus Network

More information

SecureAPlus User Guide. Version 3.4

SecureAPlus User Guide. Version 3.4 SecureAPlus User Guide Version 3.4 September 2015 Copyright Information Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious

More information

Recommended Browser Settings

Recommended Browser Settings Recommended Browser Settings Internet Explorer Settings (PC) Mozilla Firefox Settings (PC) Mozilla Firefox Settings (Mac) Safari Settings (Mac) Chrome Settings (PC) Infinite Campus recommends modifying

More information

Cisco CTL Client setup

Cisco CTL Client setup Cisco CTL Client setup This chapter provides information about Cisco CTL client setup. About Cisco CTL Client setup, page 2 Remove etoken Run Time Environment 3.00 for CTL Client 5.0 plug-in, page 2 Cisco

More information

SharpSchool Chapter 7 USER MANUAL EXTERNAL LINK PAGE For more information, please visit:

SharpSchool Chapter 7 USER MANUAL EXTERNAL LINK PAGE For more information, please visit: SHARPSCHOOL USER MANUAL CHAPTER 7 EXTERNAL LINK PAGE For more information, please visit: www.customernet.sharpschool.com www.sharpschool.com 0 TABLE OF CONTENTS 1. 2. 3. 4. INTRODUCTION... 1 KEY INFORMATION...

More information

KNOXPLANS for New Users

KNOXPLANS for New Users KNOXPLANS for New Users Version 9.1, October 2018 Contents KNOXPLANS for New Users... 1 Welcome to KnoxPlans, Version 9.1... 2 Recommended Client Hardware and O/S Specifications... 2 Browser Requirements...

More information

ms-help://ms.technet.2004apr.1033/ad/tnoffline/prodtechnol/ad/windows2000/howto/mapcerts.htm

ms-help://ms.technet.2004apr.1033/ad/tnoffline/prodtechnol/ad/windows2000/howto/mapcerts.htm Page 1 of 8 Active Directory Step-by-Step Guide to Mapping Certificates to User Accounts Introduction The Windows 2000 operating system provides a rich administrative model for managing user accounts.

More information

Settings for UPlan PC Users

Settings for UPlan PC Users UPlan operates best with certain browser and screen resolution settings. This job aid will walk you through how to set these. I. UPlan IE 11 Settings (page 1) II. UPlan Firefox Settings (page 4) III. Firefox

More information

RNDC / NDC MicroStrategy Supplier Web Troubleshooting Guide

RNDC / NDC MicroStrategy Supplier Web Troubleshooting Guide RNDC / NDC MicroStrategy Supplier Web Troubleshooting Guide Where do I log into MicroStrategy for RNDC markets? 2 Where do I log into MicroStrategy for NDC markets? 3 Why can t I log in? Most common log

More information

Accella Toolbar. User Guide. Release 20.0

Accella Toolbar. User Guide. Release 20.0 Accella Toolbar User Guide Release 20.0 Table of Contents 2 Introduction... 9 2.1 About Accella Toolbar... 9 2.2 About This Guide... 9 2.3 Accessing Toolbar... 9 2.4 First Time Login... 10 2.5 Subsequent

More information

Department of Technology MEDIA EXCHANGE WEB APPLICATION USER MANUAL

Department of Technology MEDIA EXCHANGE WEB APPLICATION USER MANUAL Department of Technology MEDIA EXCHANGE WEB APPLICATION USER MANUAL 1 Contents: MediaShuttle Transfer Application Configuration Settings and Internet Browser Settings.... 3 Firewall Settings... 5 Username

More information

Working with Applications Lesson 7

Working with Applications Lesson 7 Working with Applications Lesson 7 Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application Restrictions ADMINISTERING INTERNET EXPLORER

More information

Workstation Configuration Guide

Workstation Configuration Guide Workstation Configuration Guide August 13, 2018 Version 9.6.134.78 For the most recent version of this document, visit our documentation website. Table of Contents 1 Workstation configuration 4 1.1 Considerations

More information

Table of Contents. Section 1: DocSTAR WebView v1.0 Requirements & Installation CD... 1 Section 2: DocSTAR WebView v1.

Table of Contents. Section 1: DocSTAR WebView v1.0 Requirements & Installation CD... 1 Section 2: DocSTAR WebView v1. WebView v1.0 Installation Guide Revision 3 7/29/2003 WebView v1.0 Installation GuG ide Revision 3 7/29/2003 u Introduction Table of Contents Section 1: DocSTAR WebView v1.0 Requirements & Installation

More information

TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide

TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide Software Release 8.1 March 2018 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES

More information

Using the Horizon vrealize Orchestrator Plug-In

Using the Horizon vrealize Orchestrator Plug-In Using the Horizon vrealize Orchestrator Plug-In VMware Horizon 6 version 6.2.3, VMware Horizon 7 versions 7.0.3 and later Modified on 4 JAN 2018 VMware Horizon 7 7.4 You can find the most up-to-date technical

More information

Table of Contents. Section 1: DocSTAR NetConnect v1.0 Requirements & Installation CD. DocSTAR NetConnect v1.0 Installation Guide

Table of Contents. Section 1: DocSTAR NetConnect v1.0 Requirements & Installation CD. DocSTAR NetConnect v1.0 Installation Guide NetConnect v1.0 Installation Guide Revision 7 8/7/2002 NetConnect v1.0 Installation GuG ide Revision 7 8/7/2002 u Introduction Table of Contents Section 1: DocSTAR NetConnect v1.0 Requirements & Installation

More information

SolidWorks Enterprise PDM Installation Guide

SolidWorks Enterprise PDM Installation Guide SolidWorks Enterprise PDM Installation Guide Contents Legal Notices...vi 1 SolidWorks Enterprise PDM Installation Guide...7 2 Installation Overview...8 Required Installation Components...8 Optional Installation

More information

Integrating IBM Security Privileged Identity Manager with ObserveIT Enterprise Session Recording

Integrating IBM Security Privileged Identity Manager with ObserveIT Enterprise Session Recording Integrating IBM Security Privileged Identity Manager with ObserveIT Enterprise Session Recording Contents 1 About This Document... 2 2 Overview... 2 3 Before You Begin... 2 4 Deploying ObserveIT with IBM

More information

Parallels Remote Application Server

Parallels Remote Application Server Parallels Remote Application Server Parallels Client for Windows User's Guide v16.1 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 672 20 30 www.parallels.com Copyright

More information

Evaluation Guide Host Access Management and Security Server 12.4

Evaluation Guide Host Access Management and Security Server 12.4 Evaluation Guide Host Access Management and Security Server 12.4 Copyrights and Notices Copyright 2017 Attachmate Corporation, a Micro Focus company. All rights reserved. No part of the documentation materials

More information

2013 SP1. User's Guide

2013 SP1. User's Guide 2013 SP1 User's Guide WorkZone Explorer 2013 SP1 Contents User's Guide for WorkZone Explorer 2013 SP1 3 Revision history 4 Getting started 5 What's new 7 About the folder structure 8 Working with cases

More information

Click Studios. Passwordstate. Remote Session Launcher. Installation Instructions

Click Studios. Passwordstate. Remote Session Launcher. Installation Instructions Passwordstate Remote Session Launcher Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise

More information

Aventail WorkPlace. User s Guide Version 8.7.0

Aventail WorkPlace. User s Guide Version 8.7.0 Aventail WorkPlace User s Guide Version 8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile, Aventail Connect Tunnel,

More information

8 Administering Groups

8 Administering Groups 8 Administering Groups Exam Objectives in this Chapter: Plan a security group hierarchy based on delegation requirements. Plan a security group strategy. Why This Chapter Matters As an administrator, you

More information

COMPASS. Metropolitan Community College Installation and Configuration Guide. Version

COMPASS. Metropolitan Community College Installation and Configuration Guide. Version COMPASS Metropolitan Community College Installation and Configuration Guide Version 2013-01-16 Table of Contents 1 Introduction... 1 1.1 Workstation Requirements... 2 1.2 Network Requirements... 2 2 Installing

More information

EMC Documentum My Documentum Desktop (Windows)

EMC Documentum My Documentum Desktop (Windows) EMC Documentum My Documentum Desktop (Windows) Version 7.2 User Guide EMC Corporation Corporate Headquarters: Hopkinton, MA 017489103 15084351000 www.emc.com Legal Notice Copyright 2003 2015 EMC Corporation.

More information

Tabular Presentation of the Application Software Extended Package for Web Browsers

Tabular Presentation of the Application Software Extended Package for Web Browsers Tabular Presentation of the Application Software Extended Package for Web Browsers Version: 2.0 2015-06-16 National Information Assurance Partnership Revision History Version Date Comment v 2.0 2015-06-16

More information

Cisco NAC Appliance Agents

Cisco NAC Appliance Agents 10 CHAPTER This chapter presents overviews, login flow, and session termination dialogs for the following Cisco NAC Appliance access portals: Cisco NAC Agent, page 10-1 Cisco NAC Web Agent, page 10-28

More information