"This policy setting allows you to configure the logic that Windows uses to determine the risk for file attachments. Preferring the file handler instructs Windows to use the file handler data over the file type data. For example, trust notepad.exe, but don't trust .txt files. Preferring the file type instructs Windows to use the file type data over the file handler data. For example, trust .txt files, regardless of the file handler. Using both the file handler and type data is the most restrictive option. Windows chooses the more restrictive recommendation which will cause users to see more trust prompts than choosing the other options. If you enable this policy setting you can choose the order in which Windows processes risk assessment data. If you disable this policy Windows uses its default trust logic which prefers the file handler over the file type. If you do not configure this policy setting Windows uses its default trust logic which prefers the file handler over the file type."
This policy setting allows you to configure the amount of functionality that the shell protocol can have. When using the ...
This policy setting allows you to configure the list of high risk file types. If the file attachment is in the list of high ...
This policy setting allows you to configure the list of low risk file types. If the attachment is in the list of low risk ...
This policy setting allows you to configure the list of moderate risk file types. If the attachment is in the list of moderate ...
This policy setting allows you to configure the logic that Windows uses to determine the risk for file attachments. Preferring ...
This policy setting allows you to ensure that any Internet Explorer add-ons not listed in the 'Add-on List' policy setting ...
This policy setting allows you to manage a list of add-ons to be allowed or denied by Internet Explorer. This list can be ...
This policy setting allows you to manage a list of files or folders for which you wish to prohibit the 'Make Available Offline' ...
This policy setting allows you to manage a list of sites that you want to associate with a particular security zone. These ...