Customization Options for Specific Audiences

During installation of Windows® Internet Explorer® Administration Kit 8 (IEAK 8), you are asked to pick a role or version, based on your license agreement. This version determines what options are available for you to customize for your Internet Explorer 8 package, the steps you need to take to fully deploy that package, and how you can manage the browser after deployment. The versions available are:

  • Internet Service Provider (ISP). Choose this version if you are an ISP, and you want to use IEAK 8 to create a customized version of Internet Explorer and an Internet service sign-up package for your customers.


    In IEAK 8, the Internet sign-up option is not available for the Windows Vista® operating system.

  • Internet Content Provider (ICP). Choose this version if you are an ICP or an independent software vendor (ISV), and you want to create a customized version of Internet Explorer for customers who already have Internet accounts. As an ICP, you can also create a custom browser if you plan to use the Microsoft® Referral Server as part of the custom package. This referral server, which provides information about Internet service providers in your area, is maintained by Microsoft. You can link to sign-up servers using this referral server.

  • Corporate Administrator. Choose this version if you are an administrator, and you want to create a customized version of Internet Explorer for your users. Also, choose this version to use IEAK Profile Manager to manage settings after your custom browser is deployed.


Some features may not be available, depending on your license agreement. For more information, consult your contract.

The Setup program (all versions)

You can use all IEAK versions to customize portions of the Setup program for Internet Explorer:

  • Customize the appearance of, and amount of user interaction with, the Setup program for Internet Explorer (Corporate Administrator version only).

  • Point users to Internet servers to access the latest product versions.

  • Roll out internal programs, custom scripts, or maintenance scripts when your users install Internet Explorer.

  • Specify the language of Internet Explorer to include in the installation package. You must run the Internet Explorer Customization Wizard 8 once for each language version you want to create.

The browser (all versions)

All versions of IEAK 8 can customize portions of the Internet Explorer browser:

  • Set home, Search, and support page URLs.

  • Pre-load links and folders into Favorites, Links, and Feeds lists.

  • Change the title bar text and add custom buttons to launch programs.

Internet service sign-up (ISP version only)

ISPs have two choices for customizing sign-up for customers: a server-based or client-based package. You should use a sign-up server package for users who are not already signed up with your service. You can provide these users with a fully active account by using an HTML-based sign-up server. For users who already have accounts with your server or another service, you can deploy a custom browser to them by using a simplified process without a server. This latter type of package requires users to specify final settings as part of the installation. For more information, see Prepare for Internet Sign-up.

The Internet Explorer logo (ISP and ICP versions only)

If you are an ISP or ICP, in accordance with the terms of your license agreement, you must display the Internet Explorer logo on your packaging and promotional goods, as well as on your Web site. The artwork for your Web site, packaging, and promotional goods is located in the <systemdrive>:\Program Files\Windows IEAK 8\toolkit\graphics\samples folder.

Security and content ratings (Corporate Administrator version only)

If you are using the Corporate version of IEAK 8, you can manage the browser-related security settings and content ratings for your users and computers in your organization by doing the following:

  • Set your users' rating configurations to adhere to your organization's policies.

  • Use security zones to establish different levels of security and zones of trust.

  • Specify proxy settings for addresses and ports.

Additional references