Sometimes it gets irritated when Internet Explorer’s enhanced security configuration server 2012 blocks the programs that we want to run. This article will help you in disable internet explorer enhanced security configuration server 2012 essentials.
Technical Administrators are always worried and tad baffled about implementing the Internet Explorer Enhanced Security Configuration (IE ESC). Some experts consider it an “extremist methodology” while few think it is indispensable. Has anyone ever tried to figure out what exactly is it? The appropriate name which could be possibly coined for this feature is “Internet Explorer with restricted Usability”. On enabling this feature, Internet Explore becomes restricted thus less vulnerable to intrusions and unsigned content download. There are three options through which the IE ESC could be enabled or disabled they are – Enabling the IE ESC using the Graphic user interface, Enabling it via the help of power shell and finally by setting the Information according to General pattern.
In case you are trying to open the site Microsoft.com on Internet Explorer specifically on Windows 2012 server, then you might end up frustrated as you will have to try it least multiple times, because the settings of the browser verifies that the site is secured and contains no potential threat for the system and Operating System. For disabling the Internet Explorer Security configuration following steps need to be executed at the GUI (Graphic user Interface) level.
- Whenever you are opening the site of MSDN on the windows 2012 server, you might stumble upon a similar notification window.
For disabling the message, you will have to go to the start screen and click on the administrator Tools available there. Once you reach there you will have to scroll down to the location of Server Manager. Once you are on the server manager double click on it.
Next option would be to click on Local Server. Over here you will come across a plethora of options alike–last installed updates, Windows update, Last checked for the updates, Windows error reporting (which is Off), Customer experienced improvement program, IE enhanced Security Configuration (which is on by default) etc. you need to click on the option IE Enhanced Security configuration, and when you do so you will be redirected to the window.
Here you will be able to see two options under the administrators and users with the radio buttons of On (Recommended) and other off (options). You will have to turn off the options of IE Enhanced Security configuration and then click on the option ok. In case you wish to switch off only one option from the administrative template, then you can just do the one you wish. It depends on the requirement of the user.
Once you are finished with the above mentioned changes you can quit Internet Explorer and then restart the Internet explorer again. Now you will be able to see the difference, as you will be able to move across the website easily without the windows of the IE ESC issue which was visible every time.
Now, if you guys wish to scribble your hands on some PowerShell scripting will have to write the below script and save it with extension .ps1. This will disable IE ESC for both standard users and administrators. To execute the code mentioned below you will have to press the enter twice for getting it working.
function Disable-IEESC
{
$AdminKey = “HKLM:SOFTWAREMicrosoftActive SetupInstalled Components{A509B1A7-37EF-4b3f-8CFC-4F3A74704073}”
$UserKey = “HKLM:SOFTWAREMicrosoftActive SetupInstalled Components{A509B1A8-37EF-4b3f-8CFC-4F3A74704073}”
Set-ItemProperty -Path $AdminKey -Name “IsInstalled” -Value 0
Set-ItemProperty -Path $UserKey -Name “IsInstalled” -Value 0
Stop-Process -Name Explorer
Write-Host “IE Enhanced Security Configuration (ESC) has been disabled.” -ForegroundColor Green
}
Disable-IEESC
To conclude, few words of caution! “You should not disable the IE ESC on live production servers with live flowing upstream and downstream traffic. In case you disable the IE ESC you are reducing the risk of security and due to this the server can be exposed to attacks.
Reference: