• Ratrsop.INF File Format
  • CONNECT.RAS File Format
  • Examples of Seczones.INF, Authcode.INF, Ratings.INF, and Programs.INF
  • Security Security Considerations for Implementers
  • Change Tracking No table of changes is available. The document is either new or has had no changes since its last release. Index
  • [ms-gpie]: Group Policy: Internet Explorer Maintenance Extension Intellectual Property Rights Notice for Open Specifications Documentation




    Download 107,28 Kb.
    bet25/25
    Sana24.03.2021
    Hajmi107,28 Kb.
    #13509
    1   ...   17   18   19   20   21   22   23   24   25
    SectionName

    ValueName

    Value type

    Sample value

    Description

    Security Imports

    IEESCEnabled

    Boolean

    1

    Indicates the state of the enhanced security level of the following zone security settings.




    Zones

    Numeric

    2

    The count of Internet security zones listed in the file.



    SectionName

    ValueName

    Value type

    Sample value

    Description

    Zone%d _ HKCU

    DisplayName

    String

    Local intranet

    The friendly name of the zone.




    Description

    String

    This zone is for all websites that are found on the user's intranet.

    A longer, friendly description of the zone.




    Icon

    String

    explorer.exe#100

    The string is composed of # pointing to the icon for the zone.




    CurrentLevel

    Numeric

    66816

    An integer denoting the default security level for URL actions in this zone. For more information, see [MSDN-SECZONES].




    Flags

    Numeric

    323

    An integer conveying additional behavioral parameters for this zone. For more information, see [MSDN-SECZONES].




    Action%d

    Hexadecimal: Numeric

    1201:1

    The string :.

    Conveys a new security level for this URL action in this zone.






    MinLevel

    Numeric

    3

    An integer denoting the minimum security level for all URL actions in this zone.




    RecommendedLevel

    Numeric

    3

    An integer denoting the recommended security level for this zone.




    Mapping%d

    URL




    A URL that maps to this zone.

    Zone%d _ HKLM

    DisplayName

    String

    Trusted sites

    The friendly name of the zone.




    Description

    String

    This zone contains websites that the user trusts not to damage the user's computer and files.

    A longer, friendly description of the zone.




    Icon

    String

    explorer.exe#100

    The string is composed of # pointing to the icon for the zone.




    CurrentLevel

    Numeric

    69632

    An integer denoting the default security level for URL actions in this zone.




    Flags

    Numeric

    71

    An integer conveying additional behavioral parameters for this zone.




    Action%d

    Hexadecimal: Numeric

    1201:1

    The string : conveys a new security level for this URL action in this zone.




    MinLevel

    Numeric

    3

    An integer denoting the minimum security level for all URL actions in this zone.




    RecommendedLevel

    Numeric

    3

    An integer denoting the recommended security level for this zone.




    Mapping%d

    URL




    A URL that maps to this zone.

    PRIVACY
















    AdvancedSettings

    Numeric

    2

    An integer conveying an Internet Explorer privacy level.




    FirstPartyType

    Numeric

    3

    An integer conveying an Internet Explorer privacy level for first-party cookies.




    FirstPartyTypeText%d

    URL




    A URL that maps to the first-party privacy setting.




    ThirdPartyType

    Numeric

    4

    An integer conveying an Internet Explorer privacy level for third-party cookies.




    ThirdPartyTypeText%d

    URL




    A URL that maps to the third-party privacy setting.


          1. Ratrsop.INF File Format


    An informative description of the setting names and legal values in Ratrsop.inf follows, which uses the definitions of value type from section 4.1.1. An example of this file format is provided in section 4.5.

    SectionName

    ValueName

    Value type

    Sample value

    Description

    GENERAL
















    Filename%d

    Filename




    The file name to be used by Internet Explorer for a website rating system.




    Allow_Unknowns

    Boolean

    1

    View unknown rated sites.




    PleaseMom

    Boolean

    0

    Password override enabled.




    Approved%d

    URL




    Viewable sites.




    Disapproved%d

    URL




    Unviewable sites.




    Bureau

    String




    Ratings bureau.
        1. BMP File Format


    The BMP files under SYSVOL are not interpreted by the Group Policy: Internet Explorer Maintenance Extension protocol client or administrative tool plug-ins. For more information about BMP files, see [MSDN-BMPST].
        1. ICO File Format


    The ICO files under SYSVOL are not interpreted by the Group Policy: Internet Explorer Maintenance Extension protocol client or administrative tool plug-ins. For more information on ICO files, see [MSDN-ICO].
        1. CONNECT.RAS File Format


    The format of this file is specified in the ABNF that follows. For more information on the RAS file format, see [MSDN-RAS]. The content of this file is not interpreted by the Group Policy: Internet Explorer Maintenance Extension protocol; it is simply given directly to Internet Explorer.

    1. RasFile = Version *RasEntry

    2. Version = %x01.00.00.00

    3. RasEntry = 1*Dword

    4. DWord = 4Byte

    5. Byte = %x00-FF
        1. CS.DAT File Format


    The format of this file is specified in the following ABNF. For more information, see [MSDN-RAS2], [MSDN-WININET1], and [MSDN-WININET2]. The content of this file is not interpreted by the Group Policy: Internet Explorer Maintenance Extension protocol; it is simply given directly to Internet Explorer.

    1. csfile = csversion csheader sszname *setting

    2. csversion = %x02.00.00.00

    3. csheader = %xDE.AD.BE.AF

    4. setting = rassetting / credsetting / wininetsetting

    5. rassetting = csras dwsize csrasentry

    6. credsetting = cscred dwsize sszcredname sszcredpwd sszcreddomain

    7. wininetsetting = cswininet dwsize sszconnection dwoption *csipco

    8. sszname = sizedstring

    9. csras = %xDE.AF.BE.AF

    10. dwsize = dword

    11. csrasentry = dwsize csdata

    12. csdata = *byte

    13. cscred = %xFE.ED.BA.CC

    14. sszcredname = sizedstring

    15. sszcredpwd = sizedstring

    16. sszcreddomain = sizedstring

    17. cswininet = %xDE.CA.FB.AD

    18. sszconnection = sizedstring

    19. dwoption = dword

    20. csipco = dword

    21. sizedstring = strsize 1*wchar

    22. strsize = dword

    23. dword = wchar wchar

    24. wchar = byte byte

    25. byte = %x00-FF

    dwsize: A 32-bit unsigned integer in little-endian order that specifies the number of octets in the csdata field.

    csdata: A binary large object (BLOB) of data to be passed uninterpreted to Internet Explorer settings. The number of octets is equal to the value in the dwsize field.

    strsize: A 32-bit unsigned integer in little-endian order that specifies the number of Unicode characters in the sizedstring field.

    sizedstring: A BLOB of data to be passed uninterpreted to Internet Explorer settings. The number of octets is equal to two times the value in the strsize field.
      1. INSTALL.INS Example


    In this example, a system administrator chooses to not allow users in her group to configure proxy settings on their local machines. She, therefore, chooses to use the Internet Explorer Maintenance (IEM) Group Policy Extension to configure key proxy settings, such as "Address of Proxy Servers" and "Exceptions" list. The IEM Group Policy Extension not only helps those users by automatically providing them the correct proxy address, but it also helps the administrator manage users in her organizational unit by guaranteeing that they use the same settings, which she can modify, as necessary.

    For example, suppose the administrator wants her users to use myproxy.mycorp.com as the proxy address for all URLs except those matching "http://*.mycorp.com".



    For this example, the IEM install.ins would be as follows (adhering to the layout specified in section 2.2.1) on the remote storage location in a GPO path, such as "\\Redmond\SYSVOL\Redmond\Policies\{GPO-GUID}\user\Microsoft\IEAK". The text "GPO-GUID" is replaced with the appropriate GPO GUID from the running Group Policy server for example "\\Redmond\SYSVOL\Redmond\Policies\{E11F4FD7-25E3-4069-876B-B8C90C4A61AF}\user\Microsoft\IEAK". This GPO path is written by the administrative tool extension (as defined in section 1.3.2):

    1. [Proxy]

    2. Proxy_Enable=1

    3. HTTP_Proxy_Server=myproxy.mycorp.com:80

    4. Use_Same_Proxy=1

    5. Proxy_Override="http://*.mycorp.com;"

    6. [Branding]

    7. GPVersion=6.0.5356.0

    The IEM primary client-side plug-in when invoked then reads this configuration data from the path described above and changes the proxy settings to the address specified above. During this process, it also adds "http://*.mycorp.com" in the exception list as specified above by the configuration data. The client-side plug-in does not parse or interpret the settings or understand their semantics; it merely configures Internet Explorer with the values.
      1. Examples of Seczones.INF, Authcode.INF, Ratings.INF, and Programs.INF


    The INF file format is specified in section 4.1.3. These files are placed according to the layout specified in section 2.2.1 on the remote storage location in a GPO path, such as "\\Redmond\SYSVOL\Redmond\Policies\{GPO-GUID}\user\Microsoft\IEAK". The text "GPO-GUID" is replaced with the appropriate GPO GUID from the running Group Policy server; for example, "\\Redmond\SYSVOL\Redmond\Policies\{E11F4FD7-25E3-4069-876B-B8C90C4A61AF}\user\Microsoft\IEAK". This GPO path is written by the administrative tool extension. The following sections give examples of these INF file formats.
        1. SECZONES.INF Example


    The following is an example of the Seczones.INF file format.

    1. [Version]

    2. Signature=$Chicago$

    3. AdvancedINF=2.5



    4. [DefaultInstall]

    5. RequiredEngine=SetupAPI,"Fatal Error - missing setupapi.dll"

    6. CustomDestination=CustInstDestSection

    7. AddReg=AddReg.Hkcu,AddReg.Hklm



    8. [CustInstDestSection]

    9. 49000,49001,49002,49003=ProgramFilesDir,21

    10. 49100,49101,49102,49103=IEDir,21



    11. [ProgramFilesDir]

    12. HKLM,"SOFTWARE\Microsoft\Windows\CurrentVersion","ProgramFilesDir"

    13. ,,"%24%\Program Files"



    14. [IEDir]

    15. HKLM,"SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\

    16. iexplore.exe","Path",,"%49001%\Internet Explorer"



    17. [AddReg.Hklm]

    18. HKLM,"Software\Microsoft\Windows\CurrentVersion\Internet Settings\

    19. Zones",,,""

    20. HKLM,"Software\Microsoft\Windows\CurrentVersion\Internet Settings\

    21. Zones\2",,,""

    22. HKLM,"Software\Microsoft\Windows\CurrentVersion\Internet Settings\

    23. Zones\2",DisplayName,,"Trusted sites"

    24. HKLM,"Software\Microsoft\Windows\CurrentVersion\Internet Settings\

    25. Zones\2",CurrentLevel,0x10001,00,10,01,00

    26. HKLM,"Software\Microsoft\Windows\CurrentVersion\Internet Settings\

    27. Zones\2",Flags,0x10001,47,00,00,00

    28. HKLM,"Software\Microsoft\Windows\CurrentVersion\Internet Settings\

    29. Zones\2",120A,0x10001,03,00,00,00

    30. HKLM,"Software\Microsoft\Windows\CurrentVersion\Internet Settings\

    31. Zones\2",1400,0x10001,00,00,00,00

    32. HKLM,"Software\Microsoft\Windows\CurrentVersion\Internet Settings\

    33. ZoneMap",,,""

    34. HKLM,"Software\Microsoft\Windows\CurrentVersion\Internet Settings\

    35. ZoneMap",UNCAsIntranet,0x10001,00,00,00,00

    36. HKLM,"Software\Microsoft\Windows\CurrentVersion\Internet Settings\

    37. ZoneMap",AutoDetect,0x10001,01,00,00,00

    38. HKLM,"Software\Microsoft\Windows\CurrentVersion\Internet Settings\

    39. ZoneMap\Domains",,,""

    40. HKLM,"Software\Microsoft\Windows\CurrentVersion\Internet Settings\

    41. ZoneMap\Domains\contoso.com\www",http,0x10001,02,00,00,00



    42. [AddReg.Hkcu]

    43. HKCU,"Software\Microsoft\Windows\CurrentVersion\Internet Settings\

    44. Zones",,,""

    45. HKCU,"Software\Microsoft\Windows\CurrentVersion\Internet Settings\

    46. Zones\2",,,""

    47. HKCU,"Software\Microsoft\Internet Explorer\New Windows",PlaySound,

    48. 0x10001,01,00,00,00

    49. HKCU,"Software\Microsoft\Internet Explorer\New Windows",UseSecBand,

    50. 0x10001,01,00,00,00

    51. HKCU,"Software\Microsoft\Internet Explorer\New Windows",BlockUserInit,

    52. 0x10001,00,00,00,00

    53. HKCU,"Software\Microsoft\Internet Explorer\New Windows",UseHooks,

    54. 0x10001,01,00,00,00

    55. HKCU,"Software\Microsoft\Internet Explorer\New Windows",AllowHTTPS,

    56. 0x10001,00,00,00,00

    57. HKCU,"Software\Microsoft\Internet Explorer\New Windows",BlockControls,

    58. 0x10001,00,00,00,00

    59. HKCU,"Software\Microsoft\Internet Explorer\New Windows",PopupMgr,

    60. 0x10001,01,00,00,00
        1. AUTHCODE.INF Example


    The following is an example of the Authcode.INF file format.

    1. [Version]

    2. Signature=$Chicago$

    3. AdvancedINF=2.5



    4. [DefaultInstall]

    5. RequiredEngine=SetupAPI,"Fatal Error - missing setupapi.dll"

    6. CustomDestination=CustInstDestSection

    7. AddReg=AddReg.Hkcu



    8. [IeakInstall.Hkcu]

    9. RequiredEngine=SetupAPI,"Fatal Error - missing setupapi.dll"

    10. CustomDestination=CustInstDestSection

    11. AddReg=AddReg.Hkcu



    12. [CustInstDestSection]

    13. 49000,49001,49002,49003=ProgramFilesDir,21

    14. 49100,49101,49102,49103=IEDir,21



    15. [ProgramFilesDir]

    16. HKLM,"SOFTWARE\Microsoft\Windows\CurrentVersion","ProgramFilesDir",,"%24%\Program Files"



    17. [IEDir]

    18. HKLM,"SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\iexplore.exe","Path",,"%49001%\Internet Explorer"



    19. [AddReg.Hkcu]

    20. HKCU,"Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Trust Database\0",mjjngfjeninhealdcflmbmjjeddcpgha bicgjfnidofeoilgbaedbnpcncepokfp,,"Contoso Test Root Authority"

    21. HKCU,"Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Trust Database\0",mhakmeenekpdljcgjcikfejnnbciilai mngnindodflkogelilcgapilhnpjjoef,,"Test CodeSign CA"


        1. RATINGS.INF Example


    The following is an example of the Ratings.INF file format.

    1. [Version]

    2. Signature=$Chicago$

    3. AdvancedINF=2.5



    4. [DefaultInstall]

    5. RequiredEngine=SetupAPI,"Fatal Error - missing setupapi.dll"

    6. CustomDestination=CustInstDestSection

    7. AddReg=AddReg.Hklm



    8. [IeakInstall.Hklm]

    9. RequiredEngine=SetupAPI,"Fatal Error - missing setupapi.dll"

    10. CustomDestination=CustInstDestSection

    11. AddReg=AddReg.Hklm



    12. [CustInstDestSection]

    13. 49000,49001,49002,49003=ProgramFilesDir,21

    14. 49100,49101,49102,49103=IEDir,21



    15. [ProgramFilesDir]

    16. HKLM,"SOFTWARE\Microsoft\Windows\CurrentVersion","ProgramFilesDir",,"%24%\Program Files"



    17. [IEDir]

    18. HKLM,"SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\iexplore.exe","Path",,"%49001%\Internet Explorer"



    19. [AddReg.Hklm]

    20. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings",Key,1,C3,C7,8A,54,57,D1,20,6E,5B,22,4C,DA,09,E0,BE,4F

    21. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings",Hint,,"Jack"

    22. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings",FileName0,,"%11%\icrav03.rat"



    23. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\.Default",Allow_Unknowns,0x10001,00,00,00,00

    24. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\.Default",PleaseMom,0x10001,01,00,00,00

    25. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\.Default",Enabled,0x10001,01,00,00,00

    26. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\.Default\http://www.icra.org/pics/vocabularyv03/",n,0x10001,00,00,00,00

    27. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\.Default\http://www.icra.org/pics/vocabularyv03/",s,0x10001,00,00,00,00

    28. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\.Default\http://www.icra.org/pics/vocabularyv03/",v,0x10001,00,00,00,00

    29. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\.Default\http://www.icra.org/pics/vocabularyv03/",l,0x10001,00,00,00,00

    30. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\.Default\http://www.icra.org/pics/vocabularyv03/",oa,0x10001,00,00,00,00

    31. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\.Default\http://www.icra.org/pics/vocabularyv03/",ob,0x10001,00,00,00,00

    32. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\.Default\http://www.icra.org/pics/vocabularyv03/",oc,0x10001,00,00,00,00

    33. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\.Default\http://www.icra.org/pics/vocabularyv03/",od,0x10001,00,00,00,00

    34. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\.Default\http://www.icra.org/pics/vocabularyv03/",oe,0x10001,02,00,00,00

    35. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\.Default\http://www.icra.org/pics/vocabularyv03/",of,0x10001,00,00,00,00

    36. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\.Default\http://www.icra.org/pics/vocabularyv03/",og,0x10001,00,00,00,00

    37. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\.Default\http://www.icra.org/pics/vocabularyv03/",oh,0x10001,00,00,00,00

    38. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\.Default\http://www.icra.org/pics/vocabularyv03/",c,0x10001,00,00,00,00



    39. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\PICSRules\.Default",NumSys,0x10001,00,00,00,00

    40. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\PICSRules\.Default\0",dwFlags,0x10001,00,00,00,00

    41. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\PICSRules\.Default\0",errLine,0x10001,00,00,00,00

    42. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\PICSRules\.Default\0\PRPolicy",PRNumPolicy,0x10001,01,00,00,00

    43. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\PICSRules\.Default\0\PRPolicy\0",PRPPolicyAttribute,0x10001,02,00,00,00

    44. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\PICSRules\.Default\0\PRPolicy\0\PRPPolicySub",PRNumURLExpressions,0x10001,01,00,00,00

    45. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\PICSRules\.Default\0\PRPolicy\0\PRPPolicySub\0",PRBUInternetPattern,0x10001,01,00,00,00

    46. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\PICSRules\.Default\0\PRPolicy\0\PRPPolicySub\0",PRBUNonWild,0x10001,0D,00,00,00

    47. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\PICSRules\.Default\0\PRPolicy\0\PRPPolicySub\0",PRBUSpecified,0x10001,1F,00,00,00

    48. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\PICSRules\.Default\0\PRPolicy\0\PRPPolicySub\0",PRBUScheme,,"http"

    49. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\PICSRules\.Default\0\PRPolicy\0\PRPPolicySub\0",PRBUHost,,"www.contoso.com"

    50. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\PICSRules\.Default\0\PRPolicy\0\PRPPolicySub\0",PRBUPort,,"80"

    51. HKLM,"Software\Microsoft\Windows\CurrentVersion\Policies\Ratings\PICSRules\.Default\0\PRPolicy\0\PRPPolicySub\0",PRBUUrl,,"http://www.contoso.com"


        1. PROGRAMS.INF Example


    The following is an example of the Programs.INF file format.

    1. [Version]

    2. Signature=$Chicago$

    3. AdvancedINF=2.5



    4. [DefaultInstall]

    5. RequiredEngine=SetupAPI,"Fatal Error - missing setupapi.dll"

    6. CustomDestination=CustInstDestSection

    7. AddReg=AddReg.Hkcu,AddReg.Hklm



    8. [IeakInstall.Hkcu]

    9. RequiredEngine=SetupAPI,"Fatal Error - missing setupapi.dll"

    10. CustomDestination=CustInstDestSection

    11. AddReg=AddReg.Hkcu



    12. [IeakInstall.Hklm]

    13. RequiredEngine=SetupAPI,"Fatal Error - missing setupapi.dll"

    14. CustomDestination=CustInstDestSection

    15. AddReg=AddReg.Hklm



    16. [CustInstDestSection]

    17. 49000,49001,49002,49003=ProgramFilesDir,21

    18. 49100,49101,49102,49103=IEDir,21



    19. [ProgramFilesDir]

    20. HKLM,"SOFTWARE\Microsoft\Windows\CurrentVersion","ProgramFilesDir",,"%24%\Program Files"



    21. [IEDir]

    22. HKLM,"SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\iexplore.exe","Path",,"%49001%\Internet Explorer"



    23. [AddReg.Hklm]

    24. HKLM,"Software\Clients\Calendar",,,"Microsoft Outlook"

    25. HKLM,"Software\Clients\Contacts",,,"Microsoft Outlook"

    26. HKLM,"Software\Clients\Mail",,,"Microsoft Outlook"

    27. HKCR,"mailto",,,"URL:MailTo Protocol"

    28. HKCR,"mailto",URL Protocol,,""

    29. HKCR,"mailto",EditFlags,1,02,00,00,00

    30. HKCR,"mailto\DefaultIcon",,,"C:\PROGRA~2\MICROS~2\Office14\OUTLOOK.EXE,-9403"

    31. HKCR,"mailto\shell",,,"open"

    32. HKCR,"mailto\shell\open\command",,,""C:\PROGRA~2\MICROS~2\Office14\OUTLOOK.EXE" -c IPM.Note /m "%1""



    33. [AddReg.Hkcu]

    34. HKCU,"Software\Microsoft\Internet Explorer\Main",Check_Associations,,"yes"

    35. HKCU,"Software\Microsoft\Internet Explorer\Default HTML Editor",Description,,"Notepad"

    36. HKCU,"Software\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command",,,"%11%\NOTEPAD.EXE %1"


      1. SECZRSOP.INF Example


    The INF file format is specified earlier in section 4.1.3. The following example demonstrates its use in describing the security zone settings for Internet Explorer through use of SECZRSOP.INF file. This file is placed according to the layout specified in section 2.2.1 on the remote storage location in a GPO path, such as "\\Redmond\Sysvol\Redmond\Policies\{GPO-GUID}\user\Microsoft\IEAK" as written by the administrative tool extension.

    1. [Security Imports]

    2. Zones=5

    3. IEESCEnabled=0



    4. [Privacy]

    5. AdvancedSettings=0

    6. FirstPartyType=3

    7. ThirdPartyType=3



    8. [Zone0_HKCU]

    9. DisplayName=Computer

    10. Description=Your computer

    11. Icon=explorer.exe#0100

    12. CurrentLevel=0

    13. Flags=33

    14. Action0=1201:1

    15. Action1=1200:0

    16. Action2=1E05:196608

    17. Action15=1C00:131072

    18. Action18=1400:0

    19. Action19=1405:0



    20. [Zone1_HKCU]

    21. DisplayName=Local intranet

    22. Description=This zone is for all websites that are found on your

    23. intranet.

    24. Icon=shell32.dll#0018

    25. MinLevel=65536

    26. RecommendedLevel=66816

    27. CurrentLevel=66816

    28. Flags=323

    29. Action0=1201:3

    30. Action1=1200:0

    31. Action2=1E05:131072

    32. Action15=1C00:131072

    33. Action18=1400:0

    34. Action19=1405:0

    35. Mapping0=ftp://144.16.2.1



    36. [Zone2_HKLM]

    37. DisplayName=Trusted sites

    38. Description=This zone contains websites that you trust not to

    39. damage your computer or data.

    40. Icon=inetcpl.cpl#00004480

    41. CurrentLevel=69632

    42. Flags=71

    43. Action0=1201:3

    44. Action1=1200:0

    45. Action2=1E05:131072

    46. Action5=1A00:131072

    47. Action15=1C00:65536

    48. Action16=1402:0

    49. Action18=1400:0

    50. Action23=1804:1

    51. Mapping0=www.contoso.com




      1. RATRSOP.INF Example


    The INF file format is specified earlier in section 4.1.3. The following example demonstrates its use in describing the Content Advisor (site ratings) settings for Internet Explorer through use of RATRSOP.INF file. This file is placed according to the layout specified in section 2.2.1 on the remote storage location in a GPO path, such as "\\Redmond\SYSVOL\Redmond\Policies\{GPO-GUID}\user\Microsoft\IEAK" as written by the administrative tool extension.

    1. [General]

    2. FileName0=C:\Windows\system32\icrav03.rat

    3. Allow_Unknowns=0

    4. PleaseMom=1

    5. Disapproved0=http://www.contoso.com

    6. Approved0=http://www.microsoft.com


    1. Security

      1. Security Considerations for Implementers


    None.
      1. Index of Security Parameters


    None.
    1. Appendix A: Product Behavior


    The information in this specification is applicable to the following Microsoft products or supplemental software. References to product versions include released service packs.

    • Windows 2000 operating system

    • Windows XP operating system

    • Windows Server 2003 operating system

    • Windows Vista operating system

    • Windows Server 2008 operating system

    • Windows 7 operating system

    • Windows Server 2008 R2 operating system

    Exceptions, if any, are noted below. If a service pack or Quick Fix Engineering (QFE) number appears with the product version, behavior changed in that service pack or QFE. The new behavior also applies to subsequent service packs of the product unless otherwise specified. If a product edition appears with the product version, behavior is different in that product edition.

    Unless otherwise specified, any statement of optional behavior in this specification that is prescribed using the terms SHOULD or SHOULD NOT implies product behavior in accordance with the SHOULD or SHOULD NOT prescription. Unless otherwise specified, the term MAY implies that the product does not follow the prescription.

    <1> Section 1.3.2: This client-side plug-in uses a command exposed by Internet Explorer to configure Internet Explorer settings. The exposed command is:

    rundll32.exe iedkcs32.dll,BrandInternetExplorer /mode:gp /ins:

    Where, is the complete path of the INSTALL.INS file, which has been copied to a client computer by the client side plug-in.

    <2> Section 1.7: The following versions of the Internet Explorer browser are supported on the listed operating systems.



    Windows version

    Internet Explorer version

    Windows 2000

    Windows Internet Explorer 5, Internet Explorer 5.5, or Internet Explorer 6.

    Windows XP

    Internet Explorer 6, Internet Explorer 7, or Internet Explorer 8.

    Windows Server 2003

    Internet Explorer 6, Internet Explorer 7, or Internet Explorer 8.

    Windows Vista and Windows Server 2008

    Internet Explorer 7, Internet Explorer 8, or Internet Explorer 9.

    Windows 7 and Windows Server 2008 R2

    Internet Explorer 8 or Internet Explorer 9.

    <3> Section 3.2.5: Windows uses the function ImpersonateLoggedOnUser() to achieve this impersonation.

    <4> Section 3.2.5: Windows copies these files to a temporary folder.

    <5> Section 4.1.1: For more information on the Windows interpretation of these settings, see [MSFT-IEM].

    1. Change Tracking


    No table of changes is available. The document is either new or has had no changes since its last release.
    1. Index


    A
    Abstract data model

    administrative tool plug-in 14

    client-side plug-in 15

    ADM file format example 34

    Administrative tool plug-in

    abstract data model 14

    higher-layer triggered events 14

    initialization 14

    local events 15

    message processing 14

    overview 14

    sequencing rules 14

    timer events 15

    timers 14

    Applicability 10

    Authcode.INF file format example 35


    B
    Background 9

    BMP file format example 39


    C
    Capability negotiation 10

    Change tracking 49

    Client-side plug-in

    abstract data model 15

    higher-layer triggered events 15

    initialization 15

    local events 16

    message processing 15

    overview 15

    sequencing rules 15

    timer events 16

    timers 15

    CONNECT.RAS file format example 40

    CS.DAT file format example 40


    D
    Data model - abstract

    administrative tool plug-in 14

    client-side plug-in 15
    E
    Examples

    ADM file format 34

    Authcode.INF file format 35

    BMP file format 39

    CONNECT.RAS file format 40

    CS.DAT file format 40

    file formats - overview 17

    ICO file format 40

    INS file format 17

    INSTALL.INS 41

    overview 17

    Programs.INF file format 35

    Ratings.INF file format 35

    RATRSOP.INF 46

    Ratrsop.INF file format 39

    SECZONES.INF 41

    Seczones.INF file format 35

    SECZRSOP.INF 45

    Seczrsop.INF file format 37
    F
    Fields - vendor-extensible 11
    G
    Glossary 6
    H
    Higher-layer triggered events

    administrative tool plug-in 14

    client-side plug-in 15
    I
    ICO file format example 40

    Implementer - security considerations 47

    Index of security parameters 47

    Informative references 8

    Initialization

    administrative tool plug-in 14

    client-side plug-in 15

    INS file format example 17

    INSTALL.INS example 41

    Internet Explorer maintenance extension 9

    Introduction 6
    L
    Local events

    administrative tool plug-in 15

    client-side plug-in 16
    M
    Message processing

    administrative tool plug-in 14

    client-side plug-in 15

    Messages


    SYSVOL Structure 12

    transport 12

    Messages - transport 12
    N
    Normative references 8
    O
    Overview (synopsis) 9
    P
    Parameters - security index 47

    Preconditions 10

    Prerequisites 10

    Product behavior 48

    Programs.INF file format example 35
    R
    Ratings.INF file format example 35

    RATRSOP.INF example 46

    Ratrsop.INF file format example 39

    References 8

    informative 8

    normative 8

    Relationship to other protocols 10
    S
    Security

    implementer considerations 47

    parameter index 47

    SECZONES.INF example 41

    Seczones.INF file format example 35

    SECZRSOP.INF example 45

    Seczrsop.INF file format example 37

    Sequencing rules

    administrative tool plug-in 14

    client-side plug-in 15

    Standards assignments 11

    Structure - SYSVOL 12

    SYSVOL structure 12

    SYSVOL Structure message 12


    T
    Timer events

    administrative tool plug-in 15

    client-side plug-in 16

    Timers


    administrative tool plug-in 14

    client-side plug-in 15

    Tracking changes 49

    Transport 12

    Triggered events

    administrative tool plug-in 14

    client-side plug-in 15
    V
    Vendor-extensible fields 11

    Versioning 10



    /

    [MS-GPIE] - v20160714

    Group Policy: Internet Explorer Maintenance Extension

    Copyright © 2016 Microsoft Corporation

    Release: July 14, 2016

    Download 107,28 Kb.
    1   ...   17   18   19   20   21   22   23   24   25




    Download 107,28 Kb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    [ms-gpie]: Group Policy: Internet Explorer Maintenance Extension Intellectual Property Rights Notice for Open Specifications Documentation

    Download 107,28 Kb.