Export (0) Print
Expand All

Additional Settings

On this page of the Internet Explorer Customization Wizard 10, depending on your role, you can specify settings for your organization for various aspects of your user's computers. This includes settings for the desktop, operating system, and security.

noteNote
Customizations made on this page apply to Internet Explorer and Internet Explorer for the desktop.

To modify settings in Additional Settings

  1. Double-click each category to display the options.

  2. Click the policy or restriction you want to work with.

  3. Select or clear the appropriate check boxes.

ImportantImportant
If you do not modify a particular policy setting, the setting will be ignored. However, if you want to ensure that a setting is not selected, you must select the policy setting and then clear it with the following procedure.

To ensure a policy setting is not selected

  1. Select the check box for the policy setting.

  2. Click Back to navigate to the previous page (this sets the policy setting).

  3. Click Next to navigate to the Additional Settings page.

  4. On Additional Settings, navigate to the policy setting you selected in step 1.

  5. Clear the check box for the policy setting and make any other changes for the policy settings.

  6. Click Next to set the policy settings.

The settings displayed in the Internet Explorer Customization Wizard 10 are contained in administration (.adm) files that come with IEAK 10. These are located in the folders under <systemdrive>:\Program Files\Windows IEAK 10\policies. You can also use the wizard to configure the options you have set up in your own .adm files. The edits you make are stored as .ins files. The .ins files are used to build the .inf files for your custom package.

User settings can be stored in a central location and be made available to users who log on from computer to computer. This could be useful, for example, for a person who needs low security settings, but uses a computer that is typically operated by someone whose security settings are more restrictive.

Additional references

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback
Show:
© 2014 Microsoft