6 Appendix A: Product Behavior
The information in this specification is applicable to the following Microsoft products or supplemental software. References to product versions include updates to those products.
Windows 2000 operating system
Windows XP operating system
Windows Server 2003 operating system
Windows Vista operating system
Windows Server 2008 operating system
Windows 7 operating system
Windows Server 2008 R2 operating system
Exceptions, if any, are noted in this section. If an update version, service pack or Knowledge Base (KB) number appears with a product name, the behavior changed in that update. The new behavior also applies to subsequent updates unless otherwise specified. If a product edition appears with the product version, behavior is different in that product edition.
Unless otherwise specified, any statement of optional behavior in this specification that is prescribed using the terms "SHOULD" or "SHOULD NOT" implies product behavior in accordance with the SHOULD or SHOULD NOT prescription. Unless otherwise specified, the term "MAY" implies that the product does not follow the prescription.
<1> Section 1.3.2: This client-side plug-in uses a command exposed by Internet Explorer to configure Internet Explorer settings. The exposed command is:
rundll32.exe iedkcs32.dll,BrandInternetExplorer /mode:gp /ins:<INS-FILEPATH>
Where, <INS-FILEPATH> is the complete path of the INSTALL.INS file, which has been copied to a client computer by the client side plug-in.
<2> Section 1.7: The following versions of the Internet Explorer browser are supported on the listed operating systems.
Windows version |
Internet Explorer version |
---|---|
Windows 2000 |
Windows Internet Explorer 5, Internet Explorer 5.5, or Internet Explorer 6. |
Windows XP |
Internet Explorer 6, Internet Explorer 7, or Internet Explorer 8. |
Windows Server 2003 |
Internet Explorer 6, Internet Explorer 7, or Internet Explorer 8. |
Windows Vista and Windows Server 2008 |
Internet Explorer 7, Internet Explorer 8, or Internet Explorer 9. |
Windows 7 and Windows Server 2008 R2 |
Internet Explorer 8 or Internet Explorer 9. |
<3> Section 3.2.5: Windows uses the function ImpersonateLoggedOnUser() to achieve this impersonation.
<4> Section 3.2.5: Windows copies these files to a temporary folder.
<5> Section 4.1.1: For more information on the Windows interpretation of these settings, see [MSFT-IEM].