6 Appendix A: Product Behavior

The information in this specification is applicable to the following Microsoft products or supplemental software. References to product versions include released service packs.

  • Windows 2000 operating system

  • Windows XP operating system

  • Windows Server 2003 operating system

  • Windows Vista operating system

  • Windows Server 2008 operating system

  • Windows 7 operating system

  • Windows Server 2008 R2 operating system

Exceptions, if any, are noted below. If a service pack or Quick Fix Engineering (QFE) number appears with the product version, behavior changed in that service pack or QFE. The new behavior also applies to subsequent service packs of the product unless otherwise specified. If a product edition appears with the product version, behavior is different in that product edition.

Unless otherwise specified, any statement of optional behavior in this specification that is prescribed using the terms "SHOULD" or "SHOULD NOT" implies product behavior in accordance with the SHOULD or SHOULD NOT prescription. Unless otherwise specified, the term "MAY" implies that the product does not follow the prescription.

<1> Section 1.3.2: This client-side plug-in uses a command exposed by Internet Explorer to configure Internet Explorer settings. The exposed command is:

rundll32.exe iedkcs32.dll,BrandInternetExplorer /mode:gp /ins:<INS-FILEPATH>

Where, <INS-FILEPATH> is the complete path of the INSTALL.INS file, which has been copied to a client computer by the client side plug-in.

<2> Section 1.7: The following versions of the Internet Explorer browser are supported on the listed operating systems.

Windows version

Internet Explorer version

Windows 2000

Windows Internet Explorer 5, Internet Explorer 5.5, or Internet Explorer 6.

Windows XP

Internet Explorer 6, Internet Explorer 7, or Internet Explorer 8.

Windows Server 2003

Internet Explorer 6, Internet Explorer 7, or Internet Explorer 8.

Windows Vista and Windows Server 2008

Internet Explorer 7, Internet Explorer 8, or Internet Explorer 9.

Windows 7 and Windows Server 2008 R2

Internet Explorer 8 or Internet Explorer 9.

<3> Section 3.2.5: Windows uses the function ImpersonateLoggedOnUser() to achieve this impersonation.

<4> Section 3.2.5: Windows copies these files to a temporary folder.

<5> Section 4.1.1: For more information on the Windows interpretation of these settings, see [MSFT-IEM].

Show: