aspx
January 2006
Last Updated: February 2009
Applies to: Windows Internet Explorer 7 in Windows Vista and later
Summary In Windows Vista, Internet Explorer 7 runs in Protected Mode, which helps protect users from
attack by running the Internet Explorer process with greatly restricted privileges. Protected Mode significantly
reduces the ability of an attack to write, alter or destroy data on the user's machine or to install malicious
code.
This topic introduces Protected Mode, describes the Windows Vista features used to implement Protected
Mode, shows how to develop extensions that work with Protected Mode and provides guidelines for developing
more secure applications.
Contents
Protected Mode is an important step forward in security for Internet Explorer (IE); it helps protect users from
attack by running an IE process with greatly restricted privileges on Windows Vista. While Protected Mode
does not protect against all forms of attack, it significantly reduces the ability of an attack to write, alter, or
destroy data on the user's machine or to install malicious code.
While most Internet Explorer 7 security features will be available in Internet Explorer 7 for Windows XP
Service Pack 2, Protected Mode is only available on Windows Vista because it is based on security features
new to Windows Vista.
1 of 12 05/02/2010 18:57
Understanding and Working in Protected Mode Internet Explorer http://msdn.microsoft.com/en-us/library/bb250462(VS.85,printer).aspx
run with Administrator privileges because Windows can restrict the malicious code from carrying
out damaging actions.
The Windows Vista security infrastructure allows Protected Mode to provide Internet Explorer with the
privileges needed to browse the Web while withholding privileges needed to silently install programs or
modify sensitive system data.
This section helps you understand Protected Mode, describes the Windows Vista integrity access levels, and
summarizes the compatibility impact for Internet Explorer extensions.
Windows Vista includes an addition to the access control security mechanism of Windows that labels
processes and other securable objects with an integrity level. Internet-facing programs are at higher risk for
exploits than other programs because they download untrustworthy content from unknown sources. Running
these programs with fewer permissions, or at a lower integrity level, than other programs reduces the ability
of an exploit to modify the system or harm user data files.
Protected Mode uses the Windows Vista integrity mechanism to run the Internet Explorer process at low
integrity. The main features of the integrity level mechanism in Windows Vista are as follows:
Processes have an integrity level defined in the security access token. In Protected Mode, Internet
Explorer has a low integrity level. Applications run from the Start menu have a medium integrity
level. Applications that require administrator permissions run with a high integrity level.
Low integrity processes cannot gain write access to objects at a higher integrity levels, even if the
user's SID is granted write access in the discretionary access control list (DACL). Integrity level
checks are performed before user access permission checks.
All files and registry keys on Windows Vista have a default integrity level of Medium. A Low integrity process,
like Internet Explorer in Protected Mode, will receive access denied errors when it tries to modify existing
files.
Some folders have a low integrity mandatory label. A low integrity process, such as Internet Explorer in
Protected Mode, can create and modify files in low integrity folders. For example, the temporary Internet files
folder contains a folder called Low, which is a low integrity folder. The Windows Vista integrity mechanism
automatically assigns low integrity mandatory labels to securable objects created by low integrity processes.
As a result, all files and other objects created by Internet Explorer in Protected Mode or any other low
integrity process are automatically assigned low integrity mandatory labels. By default, child processes
started by a low integrity process will also run with a low integrity level. Protected mode allows processes to
be created with higher integrity. For details, see Starting Processes from Protected Mode section.
The following table shows supported integrity access levels and the privileges they confer.
Integrity
Access Level
(IL) System Privileges
High Administrative (Process can install files to the Program Files folder and write to sensitive
registry areas like HKEY_LOCAL_MACHINE.)
Medium User (Process can create and modify files in the user's Documents folder and write to
user-specific areas of the registry, such as HKEY_CURRENT_USER.)
Low Untrusted (Process can only write to low integrity locations, such as the Temporary Internet
Files\Low folder or the HKEY_CURRENT_USER\Software\LowRegistry key)
2 of 12 05/02/2010 18:57
Understanding and Working in Protected Mode Internet Explorer http://msdn.microsoft.com/en-us/library/bb250462(VS.85,printer).aspx
Protected Mode builds on the new integrity mechanism to restrict write access to securable objects like
processes, files, and registry keys with higher integrity levels. When run in Protected Mode, Internet Explorer
is a low integrity process; it cannot gain write access to files and registry keys in a user's profile or system
locations.
Low integrity processes can only write to folders, files, and registry keys that have been assigned a low
integrity mandatory label. As a result, Internet Explorer and extensions run in Protected Mode can only write
to low integrity locations, such as the new low integrity temporary Internet files folder, the History folder, the
Cookies folder, the Favorites folder and the Windows temporary file folders. For a complete list, see the
Frequently Asked Questions (FAQ) section.
Furthermore, Protected Mode can only send specific window messages to higher integrity processes. For more
information, please see the User Interface Privilege Isolation Overview section of Developer Best Practices and
Guidelines for Applications in a Least Privileged Environment [ http://msdn.microsoft.com/library
/default.asp.aspx?url=/library/en-us/dnlong/html/AccProtVista.asp ] .
By preventing unauthorized access to sensitive areas of a user's system, Protected Mode limits the amount of
damage that can be caused by a compromised IE process. An attacker cannot, for example, silently install a
keystroke logger to the user's Startup folder. Likewise, a compromised process cannot manipulate
applications on the desktop through window messages.
Of course, these defenses also limit legitimate changes to higher integrity locations. As a result, Protected
Mode provides a compatibility architecture that reduces the impact on existing extensions, as shown in the
following figure.
A Compatibility Layer handles the needs of many existing extensions. It intercepts attempts to
write to medium integrity resources, such as the Documents folder in the user profile and the
HKEY_CURRENT_USER registry hive. However it will not intercept writes to system locations like
Program Files and HKEY_LOCAL_MACHINE. The compatibility layer uses a Windows Compatibility
Shim [ http://www.microsoft.com/technet/windowsvista/deploy/appcompat/acshims.mspx ] to
automatically redirect these operations to the following low integrity locations.
Two higher privilege broker processes allow Internet Explorer and extensions to perform elevated
operations given user consent. For example, the user privilege broker (IEUser.exe) process
provides a set of functions that let the user saves files to areas outside of low integrity areas. In
addition, an administrator privilege broker (IEInstal.exe) process allows Internet Explorer to
install ActiveX controls.
Protected Mode can be configured in Internet Explorer's Internet Options dialog. To configure Protected Mode,
click the Security tab, select a Web content zone, and then change the "Enable Protected Mode" check box.
By default, Protected Mode is enabled for the Internet, Intranet, and Restricted Sites zones. To verify that
Internet Explorer is running in Protected mode, look for the words "Protected Mode: On" next to the Web
content zone displayed in Internet Explorer's status bar..
3 of 12 05/02/2010 18:57
Understanding and Working in Protected Mode Internet Explorer http://msdn.microsoft.com/en-us/library/bb250462(VS.85,printer).aspx
Protected Mode will be configurable through Group Policy when Windows Vista ships through the
URLACTION_LOWRIGHTS (0x00002500)URL Action. For more information, please see URL Security Zones
Overviews [ http://msdn.microsoft.com/en-us/library/ms537187(VS.85).aspx ] .
This section shows how extensions can perform common tasks while in Protected Mode; it explains how to
find low integrity object locations, save files outside low integrity file locations, elevate processes out of
Protected Mode, and debug Protected Mode access failures.
In Windows Vista, securable objects automatically inherit the lower integrity level between the process that
created them and their container. As a result, files or registry keys have a low integrity when created in
Protected Mode. This means that a low integrity process can obtain write access to the objects it creates.
However, a low integrity process cannot gain write access to medium or high integrity folders or files in the
user's profile.
Before writing to a low integrity location, extensions can determine if Internet Explorer is running in Protected
Mode by calling the IEIsProtectedModeProcess [ http://msdn.microsoft.com/library/default.asp.aspx?url=
/workshop/security/protmode/reference/functions/IEIsProtectedModeProcess.asp ] function. When in
Protected Mode, extensions can write files to a folder below the user's UserProfile folder, typically
%userprofile%\AppData\LocalLow. Use the SHGetKnownFolderPath function with the
FOLDERID_LocalAppDataLow flag to obtain the expanded folder name.
SHGetKnownFolderPath(FOLDERID_LocalAppDataLow, 0,
NULL, szPath, ARRAYSIZE(szPath));
Note Protected Mode modifies IE's environment variables. As a result, the GetTempPath() function returns
%Temp%\Low when called while Protected Mode is active.
Low integrity processes can create and write to low integrity subkeys of the registry, such as
HKEY_CURRENT_USER\Software\AppDataLow. However, extensions running in Protected mode's low integrity
process can only write to specific low integrity locations and should use IEGetWriteableHKCU [
http://msdn.microsoft.com/library/default.asp.aspx?url=/workshop/security/protmode/reference/functions
/IEGetWriteableHKCU.asp ] to obtain a low integrity registry location.
Security Alert Take care to avoid mixing integrity levels. Low integrity objects should be stored separately
from medium or high integrity objects. In addition, medium and high integrity applications should not open
low integrity objects without proper validation.
Some extensions need to save files to a particular location so that users or applications can later find the file.
The following steps show how to save a file outside of a low integrity location.
1. Create a temporary version of the file in %userprofile%\AppData\LocalLow. Don't forget to delete the
temporary file after the file is sucessfully saved.
When you do this, Protected Mode's user broker copies the file from the temporary location to the location
selected by the user.
To obtain write access to other medium integrity objects, use a custom broker process and then elevate your
broker to a medium level process. When run as medium level processes, broker objects can access medium
integrity objects. For more information, see Starting Processes from Protected Mode.
In general, extensions should operate as low integrity processes whenever possible. This provides the best
protection against malicious attacks. However, there are times when an extension may need to access
medium or even high integrity objects.
To do this, create a broker process to access higher integrity objects and then launch the broker process with
a higher integrity level. By default, Internet Explorer will prompt the user to confirm the medium integrity
elevated process, as shown in the following screen shot.
4 of 12 05/02/2010 18:57
Understanding and Working in Protected Mode Internet Explorer http://msdn.microsoft.com/en-us/library/bb250462(VS.85,printer).aspx
You can silently elevate your broker process to medium integrity level by creating an elevation policy, which
is a series of registry keys and values that tell Protected Mode how to handle elevation for a specific broker.
Elevation policies must have a globally unique identifier (GUID) associated with them. Use CreateGuid [
http://msdn.microsoft.com/library/default.asp.aspx?url=/library/en-us/vcext
/html/vxlrfvcwizlibvcwizctlcreateguid.asp ] to create a new GUID for your policy. Next, add a key to the
following location.
HKEY_LOCAL_MACHINE
SOFTWARE
Microsoft
Internet Explorer
Low Rights
ElevationPolicy
Set the name of the new key to the GUID created for your policy and then add the following settings to the
key.
1. Policy (DWORD) indicates how Protected Mode should launch the broker. The following table describes
the supported values.
Value Result
3 Protected Mode silently launches the broker as a medium integrity process.
2 Protected Mode prompts the user for permission to launch the process. If permission is
granted, the process is launched as a medium integrity process.
2. If your broker is an executable file, add the following settings to your policy.
AppPath (REG_SZ) is the user-selected install location of your broker's executable file.
3. If your extension launches a COM server that is not registered in HKEY_CLASSES_ROOT, and gets
dynamically registered through COM and launched through CoCreateInstance, add a REG_SZ value
called CLSID containing the CLSID of the COM server and add the following setting to your policy.
To illustrate, the following policy would silently elevate a fictional broker called contoso.exe to medium
integrity level.
HKEY_LOCAL_MACHINE
SOFTWARE
Microsoft
Internet Explorer
Low Rights
ElevationPolicy
5 of 12 05/02/2010 18:57
Understanding and Working in Protected Mode Internet Explorer http://msdn.microsoft.com/en-us/library/bb250462(VS.85,printer).aspx
{0002df01-0000-0000-c000-000000000046}
AppName="Contoso.exe"
AppPath="C:\%USERPROFILE%\Application Data\Contoso"
Policy=(DWORD) 00000003
Note For security reasons, Internet Explorer in Protected Mode ignores parameters that change the working
directory of createProcess [ http://msdn.microsoft.com/en-us/library/ms682425.aspx ] , createProcessAsUser
[ http://msdn.microsoft.com/en-us/library/ms682429(VS.85).aspx ] , and related functions. If your process
must accept working directory parameters, use a logical XOR operation to add
0x80000
to the value of the Policy setting of the elevation policy for your application. Be aware that this can create a
security risk; as a result, it is strongly discouraged.
If Microsoft determines that an application has a vulnerability and presents a danger to end users, Microsoft
reserves the right to remove that application at any time from the elevation policy.
You can also create broker processes to access high integrity objects. For information describing how to
launch broker processes with a high integrity level, please see the Guidelines for Administrative User
Applications section of Developer Best Practices and Guidelines for Applications in a Least Privileged
Environment [ http://msdn.microsoft.com/library/default.asp.aspx?url=/library/en-us/dnlong
/html/AccProtVista.asp ] . Note that you do not need to create an elevation policy because UAC will handle
the elevation.
If your existing extension uses rundll32.exe to host a .DLL library, you can silently launch a rundll32.exe
process with low integrity by adding the library's filename to the following key.
HKEY_LOCAL_MACHINE
SOFTWARE
Microsoft
Internet Explorer
Low Rights
RunDll32Policy
The following example shows the setting that would silently load the fictional contoso.dll library with low
integrity using rundll32.exe.
HKEY_LOCAL_MACHINE
SOFTWARE
Microsoft
Internet Explorer
Low Rights
RunDll32Policy
contoso.dll
Note The best practice is to create a custom exe to host DLL's and not use rundll32.exe.
By default, Protected mode prompts the user before allowing web content to be copied to a higher integrity
process.
You can register your application to avoid this prompt and silently accept web content from a drag-and-drop
operation by creating a DragDrop policy. DragDrop policies must have a globally unique identifier (GUID)
associated with them. Use CreateGuid [ http://msdn.microsoft.com/library/default.asp.aspx?url=/library
/en-us/vcext/html/vxlrfvcwizlibvcwizctlcreateguid.asp ] to create a new GUID for your policy. Next, add a key
to the following location.
HKEY_LOCAL_MACHINE
SOFTWARE
Microsoft
Internet Explorer
Low Rights
DragDrop
Set the name of the new key to the GUID created for your policy and then add the following settings to the
key.
1. Policy (DWORD) should be set to 3, which tells Protected mode to allow web content to be silently
copied to your application process.
2. If your application is an executable file, add the following settings to your policy.
AppPath (REG_SZ) is the user-selected install location of your application's executable file.
6 of 12 05/02/2010 18:57
Understanding and Working in Protected Mode Internet Explorer http://msdn.microsoft.com/en-us/library/bb250462(VS.85,printer).aspx
3. If your extension launches a COM server that is not registered in HKEY_CLASSES_ROOT, gets
dynamically registered through COM and launched via CoCreateInstance, add a REG_SZ value called
CLSID containing the CLSID of the COM server, add the following setting to your policy.
The following example shows the setting that would all web content to be silently copied to fictional
contoso.exe application
HKEY_LOCAL_MACHINE
SOFTWARE
Microsoft
Internet Explorer
Low Rights
DragDrop
AppName="contose.exe"
AppPath="C:\%USERPROFILE%\Application Data\Contoso"
Policy=(DWORD) 00000003
As mentioned above, UIPI blocks window messages from low to higher integrity processes. If your extension
running in Protected mode needs to communicate with an evelated application using window messages, you
can call ChangeWindowMessageFilter() [ http://msdn.microsoft.com/library/default.asp.aspx?url=/library
/en-us/winui/winui/windowsuserinterface/windowing/windows/windowreference/windowfunctions
/changewindowmessagefilter.asp ] from the elevated application to allow specific messages though.
Note The best practice is run your application with low integrity if you are communicating with Protected
mode. Otherwise use only secure forms of interprocess communication (IPC), such as remote procedure calls
(RPC), to communicate between Protected mode and a higher integrity process.
Protected Mode works with the Microsoft Application Compatibility Toolkit [ http://msdn.microsoft.com/library
/default.asp.aspx?url=/library/en-us/dnanchor/html/appcompat.asp ] introduced with Windows XP Service
Pack 2.
When Internet Explorer or its extensions attempt to write to securable objects in Protected Mode, the
7 of 12 05/02/2010 18:57
Understanding and Working in Protected Mode Internet Explorer http://msdn.microsoft.com/en-us/library/bb250462(VS.85,printer).aspx
application compatibility logs contain entries that describe the operation and its results. The following list
explains the values in the log entries.
ModuleName is the filename that launched the process accessing securable objects.
VirtualizationAction indicates the result of the write operation and is one of the following values.
WriteIgnored indicates that the operation was ignored by ProtectedMode because the
attempting process is an elevated broker.
CreateVirtualCopy indicates that the Compatibility Layer made a copy of the object in
the virtual location.
CreateNew indicates that the Compatibility Layer created a new object in the virtual
location.
APIName specifies the function attempting the operation, for example CreateFile or RegOpenKey.
ReqObjectPath is the location of the object the operation object attempted to modify. This is
blank for objects that do not have paths.
When write operations succeed, NewObjectPath specifies the object that was modified by the
operation.
APIResult indicates the result returned by the API function attempting the write operation.
This information can be invaluable when trying to determine why operations do not behave as expected.
Developing secure Internet Explorer extensions for Protected Mode is not that different from developing
secure applications for Windows Vista. In addition to the guidelines offered in Developer Best Practices and
Guidelines for Applications in a Least Privileged Environment [ http://msdn.microsoft.com/library
/default.asp.aspx?url=/library/en-us/dnlong/html/AccProtVista.asp ] and ActiveX Security: Improvements
and Best Practices [ http://msdn.microsoft.com/library/default.asp.aspx?url=/library/en-us/IETechCol
/cols/dnexpie/activex_security.asp ] , extension developers should understand how to install software from
extensions, start low integrity processes, lower resource integrity levels, and determine process integrity
levels. This section shows how to perform these tasks.
When running in Protected Mode, ActiveX controls and other extensions cannot install software. If your
extension needs to modify high integrity objects, such as the Program files or registry keys under
HKEY_LOCAL_MACHINE, you should create a standalone installation application that can be run with
administrator privileges.
To launch your application with administrator privileges, you can include an application manifest as detailed
in the Developer Best Practices and Guidelines for Applications in a Least Privileged Environment [
http://msdn.microsoft.com/library/default.asp.aspx?url=/library/en-us/dnlong/html/AccProtVista.asp ] . After
installation, your extension running in Protected mode can launch your application with medium integrity
instead of launching it from the install application with high integrity. This helps protect the user because the
application is running with user privileges instead of administrator privileges.
If you add to the elevation policy, you need to close and restart any open Internet Explorer processes.
IEUser.exe does not automatically detect and respond to elevation policy changes.
By default, child processes inherit the integrity level of the parent process. To start a low integrity process
from Protected mode, call CreateProcessAsUser [ http://msdn.microsoft.com/library/default.asp.aspx?url=
/library/en-us/dllproc/base/createprocessasuser.asp ] . To start a low integrity process from a medium
integrity process, you have to explicitly start the new process as low integrity. This is a three step process.
8 of 12 05/02/2010 18:57
Understanding and Working in Protected Mode Internet Explorer http://msdn.microsoft.com/en-us/library/bb250462(VS.85,printer).aspx
#include <sddl.h>
void CreateLowProcess()
{
BOOL bRet;
HANDLE hToken;
HANDLE hNewToken;
if (OpenProcessToken(GetCurrentProcess(),MAXIMUM_ALLOWED, &hToken))
{
if (DuplicateTokenEx(hToken, MAXIMUM_ALLOWED, NULL,
SecurityImpersonation, TokenPrimary, &hNewToken))
{
if (ConvertStringSidToSid(wszIntegritySid, &pIntegritySid))
{
TIL.Label.Attributes = SE_GROUP_INTEGRITY;
TIL.Label.Sid = pIntegritySid;
LocalFree(pIntegritySid);
}
CloseHandle(hNewToken);
}
CloseHandle(hToken);
}
}
Note You can also launch low integrity processes from Protected Mode by setting a registry key. For more
information, please see Launching Processes.
Generally, it is not a good security practice for higher level processes to accept input or share resources with
low integrity processes. There is a risk the low integrity process may attempt malicious behavior. However,
there are times when this is required by design.
Note Applications that accept input or share resources from lower integrity processes should assume that
data provided by lower integrity processes cannot be trusted and then perform appropriate validation. For
example, Protected mode displays the Save As dialog from the Internet Explorer User Broker process; this
allows the user to confirm that they want to save a file using a process that runs with higher privileges than
Protected mode.
Because low integrity applications can only write to low integrity resources, you need to lower the integrity
level of the shared resources.
9 of 12 05/02/2010 18:57
Understanding and Working in Protected Mode Internet Explorer http://msdn.microsoft.com/en-us/library/bb250462(VS.85,printer).aspx
#include <sddl.h>
#include <AccCtrl.h>
#include <Aclapi.h>
void SetLowLabelToFile()
{
// The LABEL_SECURITY_INFORMATION SDDL SACL to be set for low integrity
#define LOW_INTEGRITY_SDDL_SACL_W L"S:(ML;;NW;;;LW)"
DWORD dwErr = ERROR_SUCCESS;
PSECURITY_DESCRIPTOR pSD = NULL;
if (ConvertStringSecurityDescriptorToSecurityDescriptorW(
LOW_INTEGRITY_SDDL_SACL_W, SDDL_REVISION_1, &pSD, NULL))
{
if (GetSecurityDescriptorSacl(pSD, &fSaclPresent, &pSacl,
&fSaclDefaulted))
{
// Note that psidOwner, psidGroup, and pDacl are
// all NULL and set the new LABEL_SECURITY_INFORMATION
dwErr = SetNamedSecurityInfoW((LPWSTR) pwszFileName,
SE_FILE_OBJECT, LABEL_SECURITY_INFORMATION,
NULL, NULL, NULL, pSacl);
}
LocalFree(pSD);
}
}
Application processes can only set the integrity levels of securable objects to those at or below the application
process.
Windows Vista allows object owners to change the integrity access level of a securable object. Such changes
will not update audit logs.
Processes with READ_CONTROL privileges for a securable object can use GetNamedSecurityInfo [
http://windowssdk.msdn.microsoft.com/library/default.asp.aspx?url=/library/en-us/secauthz/security
/getnamedsecurityinfo.asp ] to determine the object's integrity level.
Note Even low integrity files will get redirected by Protected mode's compatibility shim except for known
locations mentioned in the frequently-asked questions.
Extensions that can run in different processes might want to check if the code is running in a process at Low
or Medium integrity level and modify behavior accordingly. The following steps show how to determine the
integrity level of a process.
void ShowProcessIntegrityLevel()
{
HANDLE hToken;
HANDLE hProcess;
DWORD dwLengthNeeded;
DWORD dwError = ERROR_SUCCESS;
10 of 12 05/02/2010 18:57
Understanding and Working in Protected Mode Internet Explorer http://msdn.microsoft.com/en-us/library/bb250462(VS.85,printer).aspx
hProcess = GetCurrentProcess();
if (OpenProcessToken(hProcess, TOKEN_QUERY |
TOKEN_QUERY_SOURCE, &hToken))
{
// Get the Integrity level.
if (!GetTokenInformation(hToken, TokenIntegrityLevel,
NULL, 0, &dwLengthNeeded))
{
dwError = GetLastError();
if (dwError == ERROR_INSUFFICIENT_BUFFER)
{
pTIL = (PTOKEN_MANDATORY_LABEL)LocalAlloc(0,
dwLengthNeeded);
if (pTIL != NULL)
{
if (GetTokenInformation(hToken, TokenIntegrityLevel,
pTIL, dwLengthNeeded, &dwLengthNeeded))
{
dwIntegrityLevel = *GetSidSubAuthority(pTIL->Label.Sid,
(DWORD)(UCHAR)(*GetSidSubAuthorityCount(pTIL->Label.Sid)-1));
A: No, UAC Virtualization does not apply to Protected Mode and, therefore, write access to Protected Mode
extensions that write to sensitive areas will not be redirected.
Protected Mode also does not have write access to the redirected or virtual store for system areas. Extensions
running in Protected Mode get an Access Denied error when they attempt to write to sensitive system areas.
Q: Are there specific locations in the USER PROFILE or HKEY_CURRENT_USER registry location that an
extension in Protected Mode Internet Explorer can not write to?
11 of 12 05/02/2010 18:57
Understanding and Working in Protected Mode Internet Explorer http://msdn.microsoft.com/en-us/library/bb250462(VS.85,printer).aspx
Note that extensions can not write to system locations such as the Program Files folder or the
HKEY_CLASSES_ROOT or HKEY_LOCAL_MACHINE subtrees.
Furthermore, extensions that attempt to gain write access to securable objects by using an API function in
one of the following binaries will receive Access Denied errors.
A: Many toolbar installations close all running instances of Internet Explorer and launch a new one once their
setup is finished, so that the new toolbar is visible. The problem is that the new Internet Explorer is launched
from an elevated process and, therefore, is also elevated. Toolbars can avoid this problem by closing down
Internet Explorer and re-launching it with a lower integrity level. For more information, please see Starting
Low Integrity Processes.
Acknowledgements
We would like to thank the following for their help in preparing and reviewing this article: Robert Gu, Vidya
Nallathimmayyagari, Jeremy Epling, Sharath Udupa, Hao-Wei Liu, Bogdan Tepordei, Lance Leonard, and Will
Mason.
Marc Silbey and Peter Brundrett are program managers on the Internet Explorer and Windows Security
teams.
12 of 12 05/02/2010 18:57