Prevent managing the phishing filter

This policy setting prevents the user from managing a filter that warns the user if the website being visited is known for fraudulent attempts to gather personal information through "phishing."

If you enable this policy setting, the user is not prompted to enable the phishing filter. You must specify which mode the phishing filter uses: manual, automatic, or off.

If you select manual mode, the phishing filter performs only local analysis, and the user is prompted to permit any data to be sent to Microsoft. If the feature is fully enabled, all website addresses that are not on the filter's allow list are sent automatically to Microsoft without prompting the user.

If you disable or do not configure this policy setting, the user is prompted to decide the mode of operation for the phishing filter.

Supported on: Only Internet Explorer 7.0
Select phishing filter mode


  1. Off
    Registry HiveHKEY_LOCAL_MACHINE or HKEY_CURRENT_USER
    Registry PathSoftware\Policies\Microsoft\Internet Explorer\PhishingFilter
    Value NameEnabled
    Value TypeREG_DWORD
    Value0
  2. Manual
    Registry HiveHKEY_LOCAL_MACHINE or HKEY_CURRENT_USER
    Registry PathSoftware\Policies\Microsoft\Internet Explorer\PhishingFilter
    Value NameEnabled
    Value TypeREG_DWORD
    Value1
  3. Automatic
    Registry HiveHKEY_LOCAL_MACHINE or HKEY_CURRENT_USER
    Registry PathSoftware\Policies\Microsoft\Internet Explorer\PhishingFilter
    Value NameEnabled
    Value TypeREG_DWORD
    Value2


inetres.admx

Administrative Templates (Computers)

Administrative Templates (Users)