You are on page 1of 2

Problem statement

SDS is based on internet technology (HTML, ActiveX). Internet Explorer 7 (IE7) is the new standard webbrowser within
Oc. When these two are combined, problems may arise during software download. These problems have been traced
back to the security settings in IE7, which conflict with the ActiveX components.

Suggested security settings

Internet Options | General | Temporary Internet Files | Check for newer versions of stored pages: Every time I
visit the webpage.
We suggest to add http://134.188.254.100 and http://oceservice to the Trusted Sites, and adjust the settings of
Trusted Sites to (* marks difference from default):
.NET Framework:
o Loose XAML: Enable
o XAML browser applications: Enable
o XPS document: Enable
.NET Framework reliant components:
o Run components not signed with Authenticode: Enable
o Run components signed with Authenticode: Enable
ActiveX controls and plug-ins:
Allow previously unused ActiveX controls to run without prompting: Enable (*)
Allow Scriptlets: Enable (*)
Automatic prompting for ActiveX controls: Enable (*)
Binry and script behaviors: Enable
Display video and animation on a webpage that does : Disable
Download signed ActiveX controls: Enable (*)
Download unsigned ActiveX controls: Enable (*)
Initialize and script ActiveX controls not marked: Enable (*)
Run ActiveX controls and plug-ins: Enable
Script ActiveX controls marked as safe for scripting: enable
Downloads:
Automatic prompting for file downloads: Enable (*)
File download: Enable
Font download: Enable
Enable .NET Framework setup: Enable
Miscellaneous:
Access data sources across domains: Enable (*)
Allow META REFRESH: Enable
Allow scripting of Internet Explorer Web browser control: Enable (*)
Allow script initiated windows without size or position constraints: Enable (*)
Allow web pages to use restricted protocols for active content: Prompt

Allow websites to open windows without address or status bars: Enable (*)
Display mixed content: Prompt
Don't prompt for client certificate selection when no: Enable
Drag and drop or copy and paste files: Enable
Include local directory path when uploading files to a server: Enable
Installation of desktop items: Enable
Launching applications and unsafe files: Enable (*)
Launching programs and files in an IFRAME: Enable (*)
Navigate sub-frames across different domains: Enable (*)
Open files based on content, not file extension: Enable
Software channel permissions: Low (*)
Submit non-encrypted form data: Enable
Use Phishing Filter: Disable (*)
Use Pop-up Blocker: Disable (*)
Userdata persistence: Enable
Web sites in less privileged web content zone can navigate: Prompt(*)

Scripting:
Active scripting: Enable
Allow Programmatic clipboard access: Enable (*)
Allow status bar updates via script: Enable (*)
Allow websites to prompt for information using scripted windows (*)
Scripting of Java applets: Enable
User authentication:
Logon: Automatic logon only in the Intranet zone

You might also like