Internet Feature Controls (B..C)

This article describes feature controls with names that begin with the letters B or C. For links to other feature controls, see Feature Controls.

  • Binary Behavior Security
  • Browser Emulation
  • Child Window Clipping
  • Circular References in Script Management
  • Clipboard Script Control
  • Cross Domain Capture Event
  • Cross Domain Redirection
  • Related topics

Binary Behavior Security

Microsoft Internet Explorer 6 for Windows XP Service Pack 2 (SP2). The FEATURE_BEHAVIORS allows Binary Behaviors to run more securely. When the feature is enabled, it can be set differently for each security zone by using the URL action flag URLACTION_BEHAVIOR_RUN. For more information, see About URL Security Zones.

By default, this feature is enabled for Windows Internet Explorer and for applications hosting the WebBrowser Control. To disable this feature by using the registry, add the name of your executable file to the following setting.

HKEY_LOCAL_MACHINE (or HKEY_CURRENT_USER)
   SOFTWARE
      Microsoft
         Internet Explorer
            Main
               FeatureControl
                  FEATURE_BEHAVIORS
                     contoso.exe = (DWORD) 00000000

The feature is enabled when the value is set to (DWORD) 00000001 and disabled when the value is (DWORD) 00000000.

Browser Emulation

Windows Internet Explorer 8 and later. The FEATURE_BROWSER_EMULATION feature defines the default emulation mode for Internet Explorer and supports the following values.

Value Description
11001 (0x2AF9 Internet Explorer 11. Webpages are displayed in IE11 edge mode, regardless of the declared !DOCTYPE directive. Failing to declare a !DOCTYPE directive causes the page to load in Quirks.
11000 (0x2AF8) IE11. Webpages containing standards-based !DOCTYPE directives are displayed in IE11 edge mode. Default value for IE11.
10001 (0x2711) Internet Explorer 10. Webpages are displayed in IE10 Standards mode, regardless of the !DOCTYPE directive.
10000 (0x02710) Internet Explorer 10. Webpages containing standards-based !DOCTYPE directives are displayed in IE10 Standards mode. Default value for Internet Explorer 10.
9999 (0x270F) Windows Internet Explorer 9. Webpages are displayed in IE9 Standards mode, regardless of the declared !DOCTYPE directive. Failing to declare a !DOCTYPE directive causes the page to load in Quirks.
9000 (0x2328) Internet Explorer 9. Webpages containing standards-based !DOCTYPE directives are displayed in IE9 mode. Default value for Internet Explorer 9.
Important  In Internet Explorer 10, Webpages containing standards-based !DOCTYPE directives are displayed in IE10 Standards mode.
 
8888 (0x22B8) Webpages are displayed in IE8 Standards mode, regardless of the declared !DOCTYPE directive. Failing to declare a !DOCTYPE directive causes the page to load in Quirks.
8000 (0x1F40) Webpages containing standards-based !DOCTYPE directives are displayed in IE8 mode. Default value for Internet Explorer 8
Important  In Internet Explorer 10, Webpages containing standards-based !DOCTYPE directives are displayed in IE10 Standards mode.
 
7000 (0x1B58) Webpages containing standards-based !DOCTYPE directives are displayed in IE7 Standards mode. Default value for applications hosting the WebBrowser Control.

 

For more information, see Defining Document Compatibility.

To control the value of this feature by using the registry, add the name of your executable file to the following setting and set the value to match the desired setting.

HKEY_LOCAL_MACHINE (or HKEY_CURRENT_USER)
   SOFTWARE
      Microsoft
         Internet Explorer
            Main
               FeatureControl
                  FEATURE_BROWSER_EMULATION
                     contoso.exe = (DWORD) 00009000

Child Window Clipping

Internet Explorer 9. Internet Explorer 9 optimized the performance of window-drawing routines that involve clipping regions associated with child windows. This helped improve the performance of certain window drawing operations. However, certain applications hosting the WebBrowser Control rely on the previous behavior and do not function correctly when these optimizations are enabled. The FEATURE_ENABLE_CLIPCHILDREN_OPTIMIZATION feature can disable these optimizations.

By default, this feature is enabled for Internet Explorer and for applications hosting the WebBrowser Control. To disable this feature by using the registry, add the name of your executable file to the following setting.

HKEY_LOCAL_MACHINE (or HKEY_CURRENT_USER)
   SOFTWARE
      Microsoft
         Internet Explorer
            Main
               FeatureControl
                  FEATURE_ENABLE_CLIPCHILDREN_OPTIMIZATION
                     contoso.exe = (DWORD) 00000000

The feature is enabled when the value is set to (DWORD) 00000001 and disabled when the value is (DWORD) 00000000.

Circular References in Script Management

Internet Explorer 8 and later. By default, Internet Explorer reduces memory leaks caused by circular references between Internet Explorer and the Microsoft JScript engine, especially in scenarios where a webpage defines an expando and the page is refreshed. If a legacy application no longer functions with these changes, the FEATURE_MANAGE_SCRIPT_CIRCULAR_REFS feature can disable these improvements.

By default, this feature is enabled for Internet Explorer and for applications hosting the WebBrowser Control. To disable this feature by using the registry, add the name of your executable file to the following setting.

HKEY_LOCAL_MACHINE (or HKEY_CURRENT_USER)
   SOFTWARE
      Microsoft
         Internet Explorer
            Main
               FeatureControl
                  FEATURE_MANAGE_SCRIPT_CIRCULAR_REFS
                     contoso.exe = (DWORD) 00000000

The feature is enabled when the value is set to (DWORD) 00000001 and disabled when the value is (DWORD) 00000000.

Note  Because this feature improves the stability of Internet Explorer, disabling this feature is strongly discouraged.

 

Clipboard Script Control

When enabled, the FEATURE_ENABLE_SCRIPT_PASTE_URLACTION_IF_PROMPT feature allows scripts control over the Clipboard, even when the URLACTION_SCRIPT_PASTE URL action is set to "Prompt." This allows applications hosting the WebBrowser Control to opt out of a specific security check that may be unnecessary for the content displayed by the application. If the content is fully trusted and cannot be modified by any third-party, it may be safe to enable this feature. However, such a design decision should include a full security assessment. For more information, see Threat Modeling.

By default, this feature is disabled for Internet Explorer and enabled for applications hosting the WebBrowser Control. To enable this feature by using the registry, add the name of your executable file to the following setting.

HKEY_LOCAL_MACHINE (or HKEY_CURRENT_USER)
   SOFTWARE
      Microsoft
         Internet Explorer
            Main
               FeatureControl
                  FEATURE_ENABLE_SCRIPT_PASTE_URLACTION_IF_PROMPT
                     contoso.exe = (DWORD) 00000001

The feature is enabled when the value is set to (DWORD) 00000001 and disabled when the value is (DWORD) 00000000.

Controlling calls between Internet Explorer and ShellExecute

When the FEATURE_DISABLE_IE_SHELLEXECUTE_CALLS feature is enabled, an admin will be able to configure interaction from Internet Explorer (IE) web platform (WebPlat) binaries with the Windows Shell using the ShellExecute API.

Note

By default, calls from Internet Explorer components to ShellExecute using unregistered protocols are blocked.

Unregistered protocols: Identified scheme names that exist in the registry but do not have a URL Protocol sub-key or do not exist in the registry at all. Examples include: cpl, vbs

Registered protocols: Identified scheme names that exist in the registry and have a URL Protocol sub-key. Examples include: http, https, mailto,

Non-protocol ShellExecute calls: There is neither a URL nor a scheme name, but ShellExecute is being used to invoke a command.

Configuring this feature

Follow the below steps to configure this feature:

Step 1: Navigate to the below registry path Copy

HKEY_LOCAL_MACHINE (or HKEY_CURRENT_USER)     
   SOFTWARE      
          Microsoft    
                 Internet Explorer      
                        Main      
                           FeatureControl 
                                FEATURE_DISABLE_IE_SHELLEXECUTE_CALLS      

Step 2: Configure the * hexadecimal value as described below

Value Description
0x00000000 Allow all ShellExecute calls
0x00000001 Disallow unknown protocols only. Registered protocols and non-protocol ShellExecute calls are allowed. This is the default configuration
0x00000011 Disallow both unknown and registered protocols. Non-protocol ShellExecute calls are allowed.
0x00000111 Disallow all ShellExecute calls regardless of being based on a protocol or not.

When enabling this feature, please be aware of the order of precedence as documented in the Introduction to Feature Control Key page and configure accordingly. The order of precedence is as below.

  • HKEY_LOCAL_MACHINE policy hive (administrative overrides)

  • HKEY_CURRENT_USER policy hive

  • HKEY_CURRENT_USER preference hive

  • HKEY_LOCAL_MACHINE preference hive (system default settings)

Cross Domain Capture Event

The FEATURE_BLOCK_SETCAPTURE_XDOMAIN feature prevents capture events from being propagated to elements in webpages hosted on domains different than the one hosting the page containing the element that triggered the capture event.

By default, this feature is enabled for Internet Explorer 8 and for applications hosting the WebBrowser Control. To disable this feature by using the registry, add the name of your executable file to the following setting.

HKEY_LOCAL_MACHINE (or HKEY_CURRENT_USER)
   SOFTWARE
      Microsoft
         Internet Explorer
            Main
               FeatureControl
                  FEATURE_BLOCK_SETCAPTURE_XDOMAIN
                     contoso.exe = (DWORD) 00000000

The feature is enabled when the value is set to (DWORD) 00000001 and disabled when the value is (DWORD) 00000000.

Cross Domain Redirection

When enabled, the FEATURE_CROSS DOMAIN_REDIRECT_MITIGATION feature applies cross-domain security to support files loaded by a webpage, including images, JavaScript libraries, Cascading Style Sheets (CSS) files, Microsoft ActiveX controls, and other file-based resources.

Note  For security reasons, this feature should not be changed.

 

By default, this feature is enabled for Internet Explorer 8 and for applications hosting the WebBrowser Control. To disable this feature by using the registry, add the name of your executable to the following setting.

HKEY_LOCAL_MACHINE (or HKEY_CURRENT_USER)
   SOFTWARE
      Microsoft
         Internet Explorer
            Main
               FeatureControl
                  FEATURE_CROSS_DOMAIN_REDIRECT_MITIGATION
                     contoso.exe = (DWORD) 00000000

The feature is enabled when the value is set to (DWORD) 00000001 and disabled when the value is (DWORD) 00000000.

Conceptual

Internet Feature Controls (A)

Internet Feature Controls (D..H)

Internet Feature Controls (I..L)

Internet Feature Controls (M..R)

Internet Feature Controls (S..T)

Internet Feature Controls (U..Y)

Internet Feature Controls (Z)

Obsolete Feature Controls

Feature Control Registry Index