This policy setting prevents the user from managing SmartScreen Filter, which warns the user if the website being visited is known for fraudulent attempts to gather personal information through "phishing," or is known to host malware. If you enable this policy setting, the user is not prompted to turn on SmartScreen Filter. All website addresses that are not on the filter's allow list are sent automatically to Microsoft without prompting the user. If you disable or do not configure this policy setting, the user is prompted to decide whether to turn on SmartScreen Filter during the first-run experience.
This policy setting prevents the user from deleting the history of websites that he or she has visited. This feature is available ...
This policy setting prevents the user from having enclosures (file attachments) downloaded from a feed to the user's computer. ...
This policy setting prevents the user from ignoring Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificate errors ...
This policy setting prevents the user from managing a filter that warns the user if the website being visited is known for ...
This policy setting prevents the user from managing SmartScreen Filter, which warns the user if the website being visited ...
This policy setting prevents the user from participating in the Customer Experience Improvement Program (CEIP). If you enable ...
This policy setting prevents the user from performing actions which will delete browsing history. For more information on ...
This policy setting prevents the user from searching apps, files, settings (and the web if enabled) when the user searches ...
This policy setting prevents the user from specifying a URL that contains update information about cipher strength. When ...