This policy setting allows you to configure how Internet Explorer sends the Do Not Track (DNT) header. If you enable this policy setting, Internet Explorer sends a DNT:1 header with all HTTP and HTTPS requests. The DNT:1 header signals to the servers not to track the user. For Internet Explorer 9 and 10: If you disable this policy setting, Internet Explorer only sends the Do Not Track header if a Tracking Protection List is enabled or inPrivate Browsing mode is used. For at least Internet Explorer 11: If you disable this policy setting, Internet Explorer only sends the Do Not Track header if inPrivate Browsing mode is used. If you don't configure the policy setting, users can select the Always send Do Not Track header option, in Internet Explorer settings. By selecting this option, Internet Explorer sends a DNT:1 header with all HTTP and HTTPS requests; unless the user grants a site-specific exception. Internet Explorer sends a DNT:0 header to any sites granted an exception. By default, this option is turned on.
This policy setting allows you to configure Group Policy caching behavior. If you enable or do not configure this policy ...
This policy setting allows you to configure heuristics. Suspicious detections will be suppressed right before reporting to ...
This policy setting allows you to configure how File Explorer displays thumbnail images or icons on network folders. File ...
This policy setting allows you to configure how File Explorer displays thumbnail images or icons on the local computer. File ...
This policy setting allows you to configure how Internet Explorer sends the Do Not Track (DNT) header. If you enable this ...
This policy setting allows you to configure how new tabs are created by default in Internet Explorer. If you enable this ...
This policy setting allows you to configure how often a Distributed File System (DFS) client attempts to discover domain ...
This policy setting allows you to configure how the computer's Trusted Platform Module (TPM) security hardware secures the ...
This policy setting allows you to configure how the computer's Trusted Platform Module (TPM) security hardware secures the ...