How to disable private browsing in internet explorer 9

how to disable private browsing in internet explorer 9

How do you disable InPrivate browsing on a Microsoft Family child account?

Sep 30, Disable private browsing. If you have children or vulnerable people in your household, disabling private browsing means they wont be able to hide their activities or circumvent internet. Mar 31, One important step is disabling the ability to delete Internet Explorer's browsing history. Administrator accounts on all versions of Windows can make a few quick changes to the registry, and Ultimate or Enterprise users can use the Group Policy Editor to easily disable the function.

To create this article, 37 people, some anonymous, worked to edit and improve it over time. The wikiHow Tech Team also followed the article's instructions and verified that they work. This article has been viewedtimes. Learn more If you're setting up a Windows PC for your home or small business, you may want to keep tabs on which websites your employees or kids visit.

However, when you're using Microsoft Edge, it's possible for any user to delete their browsing history to cover their tracks. Want to make sure nobody can do that? This wikiHow teaches you how to disable the feature that allows Microsoft Edge users to delete their browsing and download history. Open the Registry Editor. Create a new key called Edge. Click OK. Restart Edge. Did this summary help you?

Yes No. Log in Social login does not work in incognito and private browsers. Please log in with your username or email to continue. No account yet? Create an account. Edit this Article. We use cookies to make wikiHow great. By using our site, you agree to our cookie policy. Cookie Settings. Learn why people trust wikiHow. Download Article Explore this Article methods. Tips and Warnings. Related Articles.

Article Summary. Method 1 of This opens the Run dialog window. This method may seem complicated, but it's really the most straightforward way to accomplish this task on a Windows 10 or 8. You can also use this on other versions of Windows 8 and 10, but if you have a Professional or Enterprise edition, check out the Using the Group Policy Editor method.

Type regedit and click OK. This opens the registry editor. Use the tree on the left to navigate. Although you'll already see a key in here called "MicrosoftEdge," you actually need to create another one.

Here's how: Right-click the Microsoft folder in the left panel. A menu will expand. Type Edge and press Enter. Click the new Edge key. This selects the key. Double-click AllowDeletingBrowserHistory to open the editor. If you don't see a zero under "Value data," enter one now and click OK.

Open Microsoft Edge. If Edge was already open, close all open windows and then restart it so the changes will take effect. Now that you've edited the registry, the option to delete the user's browser history will no longer be available.

Here's how you can test this: Click the three dots at the top-right corner of Edge and select Settings. Click the Privacy, search, and services tab in the left panel. On the right panel, scroll down how to watch full episodes "Clear browsing data" and click the How to disable private browsing in internet explorer 9 what to clear button. You will now see padlock icons next to "Browser history" and "Download history.

As long as your registry changes remain, the history cannot be deleted. Re-allow deleting the browsing history. If you share the computer with others, you may want to re-enable deletion of your browsing history at some point. Fortunately, now that you've created a registry key, it'll be easy to toggle between allowing and denying deletion.

Double-click the AllowDeletingBrowserHistory entry in the right panel. Replace the "0" with a "1" and click OK. Method 2 of Download the latest administrative templates for your version of Edge.

Click the Get Policy Files link. Save the ". Also, what is the meaning of easter egg hunt you don't have 7-Zip installed, you'll need it to decompress the CAB. Decompress the files.

Click the Extract button in the toolbar. Choose a location to extract the file inside to and click OK. Go to the newly-compressed file, which is called MicrosoftEdgePolicyTemplates. It's actually another compressed filehowever, this time it's a ZIP file that you can unpack without worrying about 7-Zip.

Right-click MicrosoftEdgePolicyTemplates. Click Next to extract the files, which creates a new folder inside the current folder called MicrosoftEdgePolicyTemplates. This opens a second File Explorer window. You should now see both File Explorer windows on the screen. Go to the PolicyDefinitions folder in the new File Explorer window. To avoid confusion, we'll call the first window you opened "MicrosoftEdgePolicyTemplates," as that's what you'll see in the title bar. We'll call the second one "PolicyDefinitions.

Here's how: In the File Explorer window that's open to MicrosoftEdgePolicyTemplates, double-click windowsand then double-click admx. Drag the file called msedge. Allow the file to be overwritten if prompted. Double-click the folder called en-US in both open File Explorer windows. Now you can close all of these pesky File Explorer windows. Open the group policy editor. Navigate using the directory tree in the left frame.

If you want to disable history deleting for just a specific user instead of all users, log into that user's account and select the User Configuration folder instead of Computer Configuration. Double-click Enable deleting browser and download history.

It's in the right panel. If you don't see this option, you may need to restart your computer for your previous changes to take effect. Select "Disabled" and click OK. This effectively prevents users from disabling the browser history. You can re-enable this feature at any time by selecting Enabled on this window.

Pickle Rick. It depends on if you are using Apple or Android. You can from there disable that feature, or you can just download another internet viewer from the Google apps store. I believe you can do the same for Apple. There are also many privacy options for the Apple OS under settings. Not Helpful 0 Helpful 0. On Google Chrome, look for three dots in the upper right hand corner. Click on that, and go to History. Open it and click "Clear Browsing History". Not Helpful 17 Helpful 0.

Include your email address to get a message when this question is answered. These settings will not affect browsers other than Microsoft Edge, including Firefox or Google Chrome. Make sure no other browsers are installed on the computer, as they might be used to circumvent your settings.

Privacy settings

To open an InPrivate Browsing session, rightclick the Internet Explorer icon on the taskbar, and select Start InPrivate Browsing. To turn off add-ons in InPrivate Browsing sessions. Open the desktop, and then select the Internet Explorer icon on the taskbar. Select the Tools button, and then select Internet . Apr 13, This is great news for Windows users who need to keep students, children and employees safe from certain web content. Keep your Internet Explorer users safe by blocking unsavory or distracting websites on all recent version of Windows. Keep in mind that these methods only restrict browsing on Internet Explorer - not on any other web browser! Feb 15, Bottom line, there is no clear-cut method for disabling delete browsing history on Mozilla Firefox, Google Chrome, and Microsoft Edge. The only browser that supports this function is Internet Explorer. Hence, if you want to have unfettered access to your kids or employees browsing history, Internet Explorer is the ideal browser for you.

The smb. The complete description of the file format and possible parameters held within are here for reference purposes. The Samba suite includes a number of different programs. Some of them operate in a client mode, others are server daemons that provide various services to its clients. The Samba suite's client applications read their configuration only once. Any changes made after start aren't reflected in the context of already running client code.

The Samba suite's server daemons reload their configuration when requested. However, already active connections do not change their configuration. More detailed information can be found in smbd 8 and winbindd 8 manual pages. To request Samba server daemons to refresh their configuration, please use smbcontrol 1 utility. The file consists of sections and parameters.

A section begins with the name of the section in square brackets and continues until the next section begins. Sections contain parameters of the form:. The file is line-based - that is, each newline-terminated line represents either a comment, a section name or a parameter. Only the first equals sign in a parameter is significant. Whitespace before or after the first equals sign is discarded. Leading, trailing and internal whitespace in section and parameter names is irrelevant.

Leading and trailing whitespace in a parameter value is discarded. Internal whitespace within a parameter value is retained verbatim. Case is not significant in boolean values, but is preserved in string values. Some items such as create masks are numeric. The section name is the name of the shared resource and the parameters within the section define the shares attributes. There are three special sections, [global], [homes] and [printers], which are described under special sections.

The following notes apply to ordinary section descriptions. A share consists of a directory to which access is being given plus a description of the access rights which are granted to the user of the service. Some housekeeping options are also specifiable. Sections are either file share services used by the client as an extension of their native file systems or printable services used by the client to access print services on the host running the server. Sections may be designated guest services, in which case no password is required to access them.

A specified UNIX guest account is used to define access privileges in this case. Sections other than guest services will require a password to access them.

The client provides the username. The access rights granted by the server are masked by the access rights granted to the specified or guest UNIX user by the host system.

The server does not grant more access than the host system grants. The following sample section defines a file space share. The share is accessed via the share name foo :. The following sample section defines a printable share. The share is read-only, but printable. That is, the only write access permitted is via calls to open, write to and close a spool file. The guest ok parameter means access will be permitted as the default guest user specified elsewhere :.

Parameters in this section apply to the server as a whole, or are defaults for sections that do not specifically define certain items. If a section called [homes] is included in the configuration file, services connecting clients to their home directories can be created on the fly by the server. When the connection request is made, the existing sections are scanned.

If a match is found, it is used. If no match is found, the requested section name is treated as a username and looked up in the local password file. If the name exists and the correct password has been given, a share is created by cloning the [homes] section.

For example:. This is a fast and simple way to give a large number of clients access to their home directories with a minimum of fuss. This method of using the [homes] section works well if different users share a client PC. The [homes] section can specify all the parameters a normal service section can specify, though some make more sense than others.

The following is a typical and suitable [homes] section:. An important point is that if guest access is specified in the [homes] section, all home directories will be visible to all clients without a password. In the very unlikely event that this is actually desirable, it is wise to also specify read only access. The browseable flag for auto home directories will be inherited from the global browseable flag, not the [homes] browseable flag.

If a [printers] section occurs in the configuration file, users are able to connect to any printer specified in the local host's printcap file. When a connection request is made, the existing sections are scanned. If no match is found, but a [homes] section exists, it is used as described above. Otherwise, the requested section name is treated as a printer name and the appropriate printcap file is scanned to see if the requested section name is a valid printer share name.

If a match is found, a new printer share is created by cloning the [printers] section. If the share does not permit guest access and no username was given, the username is set to the located printer name.

The [printers] service MUST be printable - if you specify otherwise, the server will refuse to load the configuration file. Typically the path specified is that of a world-writeable spool directory with the sticky bit set on it. A typical [printers] entry looks like this:. All aliases given for a printer in the printcap file are legitimate printer names as far as the server is concerned.

If your printing subsystem doesn't work like that, you will have to set up a pseudo-printcap. This is a file consisting of one or more lines like this:. Each alias should be an acceptable printer name for your printing subsystem. In the [global] section, specify the new file as your printcap. The server will only recognize names found in your pseudo-printcap, which of course can contain whatever aliases you like.

The same technique could be used simply to limit access to a subset of your local printers. An alias, by the way, is defined as any component of the first entry of a printcap record.

Records are separated by newlines, components if there are more than one are separated by vertical bar symbols. See the printcap name option for more details. Starting with Samba version 3. This capability is called usershares and is controlled by a set of parameters in the [global] section of the smb. The relevant parameters are :. Points to the directory containing the user defined share definitions.

The filesystem permissions on this directory control who can create user defined shares. Comma-separated list of absolute pathnames restricting what directories can be shared. Only directories below the pathnames in this list are permitted.

Directories below the pathnames in this list are prohibited. Names a pre-existing share used as a template for creating new usershares. All other share parameters not specified in the user defined share definition are copied from this named share.

To allow members of the UNIX group foo to create user defined shares, create the directory to contain the share definitions as follows:. Members of the group foo may then manipulate the user defined shares using the following commands. Some parameters are specific to the [global] section e. Some parameters are usable in all sections e. All others are permissible only in normal sections.

For the purposes of the following descriptions the [homes] and [printers] sections will be considered normal. The letter G in parentheses indicates that a parameter is specific to the [global] section. The letter S indicates that a parameter can be specified in a service specific section. All S parameters can also be specified in the [global] section - in which case they will define the default behavior for all services.

Parameters are arranged here in alphabetical order - this may not create best bedfellows, but at least you can find them! Where there are synonyms, the preferred synonym is described, others refer to the preferred synonym.

Many of the strings that are settable in the config file can take substitutions. These substitutions are mostly noted in the descriptions below, but there are some general substitutions which apply whenever they might be relevant. These are:. This parameter is not available when Samba listens on port , as clients no longer send this information. This will cause Samba to not listen on port and will permit include functionality to function as it did with Samba 2.

This allows you to change your config based on what the client calls you.

0 thoughts on “How to disable private browsing in internet explorer 9

Add a comment

Your email will not be published. Required fields are marked *