Elevation policy registry organization
You can create a broker GUID with the following values and change the default elevation policy:
- AppName: A REG_SZ value for the executable file name.
- AppPath: A REG_SZ value for the user-selected install location of the
executable file.
- CLSID: If your extension starts a COM server, add a REG_SZ value that
contains the CLSID of your extension.
- Policy: A DWORD value that indicates how protected mode should start the
broker. The following table describes the supported values and their
meanings.
Collapse this tableExpand this table
Value | Result |
---|
3 | Protected mode silently starts the broker as a
medium integrity process. |
2 | Protected mode prompts the user for permission to
start the process. If permission is granted, the process is started as a
medium integrity process. |
1 | Protected mode silently starts the broker as a low
integrity process. |
0 | Protected mode prevents the process from
starting. |
Warning Serious problems might occur if you modify the registry incorrectly by using Registry Editor or by using another method. These problems might require that you reinstall your operating system. Microsoft cannot guarantee that these problems can be solved. Modify the registry at your own risk.
You will have to add the GUIDs as follows:
- Add this GUID under the following registry subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft
\Internet Explorer \Low Rights\ElevationPolicy
- Create a similar
registry entry under one of the following registry subkeys:
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\InternetExplorer\Low Rights\ElevationPolicy
HKEY_CURRENT_USER\Software\Policies\Microsoft\InternetExplorer\Low Rights\ElevationPolicy
Create the custom .adm fileTo create the custom .adm file to include this policy, follow
these steps:
- Define a list of the applications for which you want to configure the
elevation policy. Decide which elevation policy that you want for each of them. Use values 0�3 from the table that was described earlier in this
article.
- Open a text editor such as Notepad and copy the following template into the Notepad file.
Note The values represented by <APPNAME1>, <APPPATH1>, <CLSID1>, and <POLICY1> in this code and other code examples in this article, are placeholders for the application name, its path, the CLSID, and policy that has to be applied.
CLASS USER
CATEGORY !!WindowsComponents
CATEGORY !!InternetExplorer
POLICY !!ConfigureElevationPolicy
#if version >= 4
SUPPORTED !!SUPPORTED_IE7
#endif
KEYNAME "Software\Policies\Microsoft\Internet Explorer\Low Rights\ElevationPolicy"
ACTIONLISTON
KEYNAME "Software\Policies\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\<GUID1>"
VALUENAME AppName VALUE "<APPNAME1>"
VALUENAME AppPath VALUE "<APPPATH1>"
VALUENAME CLSID VALUE "<CLSID1>"
VALUENAME Policy VALUE NUMERIC "<POLICY1>"
END ACTIONLISTON
END POLICY
END CATEGORY
END CATEGORY
CLASS MACHINE
CATEGORY !!WindowsComponents
CATEGORY !!InternetExplorer
<POLICY ... END POLICY will be exactly same as that under class user>
END CATEGORY
END CATEGORY
[strings]
SUPPORTED_IE7="At least Internet Explorer 7.0"
WindowsComponents="Windows Components"
InternetExplorer="Internet Explorer"
ConfigureElevationPolicy="Enable customizing the elevation policy for Protected Mode"
Create the .admx and .adml files
To create the .admx and .adml files, use the following template
instead of creating custom .adm template files. To populate this template with real values for .
adm files, you can also follow step 3. Repeat the block of code between <enabledList> and </enabledList> for
other applications.
Create the ElevationPolicy.admx file
<?xml version="1.0" encoding="utf-8"?>
<policyDefinitions xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" revision="1.0" schemaVersion="1.0" xmlns="http://www.microsoft.com/GroupPolicy/PolicyDefinitions">
<policyNamespaces>
<target prefix="ElevationPolicy" namespace="Microsoft.Policies.ElevationPolicy" />
<using prefix="inetres" namespace="Microsoft.Policies.InternetExplorer" />
</policyNamespaces>
<resources minRequiredRevision="1.0" />
<policies>
<policy name="ConfigureElevationPolicy_1" class="User" displayName="$(string.ConfigureElevationPolicy)" key="Software\Policies\Microsoft\Internet Explorer\Low Rights\ElevationPolicy">
<parentCategory ref="inetres:InternetExplorer" />
<supportedOn ref="inetres:SUPPORTED_IE7Vista"/>
<enabledList>
<item key="Software\Policies\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\<GUID1>" valueName="AppName">
<value>
<string><APPNAME1></string>
</value>
</item>
<item key="Software\Policies\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\<GUID1>" valueName="AppPath">
<value>
<string><APPPATH1></string>
</value>
</item>
<item key="Software\Policies\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\<GUID1>" valueName="CLSID">
<value>
<string><CLSID1></string>
</value>
</item>
<item key="Software\Policies\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\<GUID1>" valueName="Policy">
<value>
<decimal value="<POLICY1>" />
</value>
</item>
</enabledList>
</policy>
<policy name="ConfigureElevationPolicy_2" class="Machine" displayName="$(string.ConfigureElevationPolicy)" key="Software\Policies\Microsoft\Internet Explorer\Low Rights\ElevationPolicy">
<parentCategory ref="inetres:InternetExplorer" />
<supportedOn ref="inetres:SUPPORTED_IE7Vista"/>
<enabledList> <same as user policy above> </enabledList>
</policy>
</policies>
</policyDefinitions>
Create the ElevationPolicy.adml file
<?xml version="1.0" encoding="utf-8"?>
<policyDefinitionResources xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" revision="1.0" schemaVersion="1.0" xmlns="http://www.microsoft.com/GroupPolicy/PolicyDefinitions">
<displayName>enter display name here</displayName>
<description>enter description here</description>
<resources>
<stringTable>
<string id="ConfigureElevationPolicy">Enable customizing the elevation policy for Protected Mode</string>
</stringTable>
</resources>
</policyDefinitionResources>
Note You should put the .admx file under
<%windir%>\policydefinitions and the .adml
file under <%windir%>\policydefinitions\<%lang-dir%>. Run gpedit.msc to verify the results. - Populate the policy template with the appropriate values. To do
this, follow these steps.
- Generate a new GUID and replace
<GUID1> in the code example with the new GUID.
- For the first application that you selected, write the
executable name instead of <APPNAME1> and the
path of the executable at <APPPATH1>. If your
extension starts a COM server, add the CLSID of your extension at
<CLSID>. Write the elevation policy number 0-3
for the application at <POLICY1>.
- Replicate the block of code between <enabledList> and </enabledList> for all the other applications
that you selected, and then repeat steps 3a and step 3b to populate those
blocks.
- Copy the policy that was created in step 3 under the CLASS MACHINE entry in the code.
- Save the file as an .adm file. For example,
save it as ElevationPolicy.adm.
- To verify the results, do the following:
- Open Group Policy Object Editor.
- Locate Computer Configuration,
and then expand Administrative Templates.
- Right-click
Administrative Templates, and then click Add/Remove
Templates. In the dialog box, click Add to add the
ElevationPolicy.adm file that you created in step 4.
Note The .admx files or .adml files must be put under
<%windir%>\policydefinitons\. They cannot
be added later by right-clicking on Group Policy Object Editor. - Locate Computer Configuration,
expand Administrative Templates, expand Windows
Components, and then click Internet Explorer.
- In the
right panel, search for the new policy "Enable customizing the elevation policy
for Protected Mode" and enable this policy.
- Examine the registry to verify that
the desired registry entry is populated under
the following subkey:
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Internet
Explorer\Low Rights\ElevationPolicy
. - Repeat step 5c for the User Configuration. Examine the
registry to verify that the desired registry entry is populated under
the following subkey:
HKEY_CURRENT_USER\Software\policies\Microsoft\Internet
Explorer\Low Rights\ElevationPolicy
Note Steps 3d, 4, and 5b are only for .adm files.