views:

52

answers:

3

Is there any method to tell from javascript if the browser has "enhanced security configuration" enabled?

I keep running into problems with certain controls not working from within dynamically loaded content. This only happens with browsers running on Windows Server 2003/2008 systems - even when I add the server to the "trusted" zone.

Maybe somebody has already develoepd a method for accomplishing this task?

Thanks in advance

A: 

I think you can look for SV1 in the user agent string.

jeffamaphone
Unfortunately that doesn't do the trick. According to Microsoft:http://msdn.microsoft.com/en-us/library/ms537503%28VS.85%29.aspxthe string "SV1" is only used by Internet Explorer 6. A quick test on a few machines seems to confirm this.
hanno2169
+1  A: 

I don't think it's possible, and if it still is, than that's a bug that might sooner or later be fixed.

One of the main points of this "extra security" was for the client to have it but not to be detected by the servers, thus leaving them no way to know when to try to circumvent it and when not.

Adrian A.
I think you can easily detect at lest the symptoms (scripts/activeX disabled), at least *after* the first request. I don't think this is a bug.
Ben Schwehn
A: 

Isn't javascript disabled when using enhanced security configuration?

Then if you only want to display a message to the user, simply display a message in normal html and hide it with javascript so only users without javascript will see it. If you need to handle it on the server side (e.g. outputting a differerent version of your website) simply include javascript to redirect users to your javascript enabled version. Users without javascript will remain on the non-js page.

If only scriptable activex are disabled, the same method applies, simply insert a activeX and try to "script" it, if it fails you can redirect, show a message etc.

The above of course doesn't detect enhanced security configuration per se, but the symptons that occur when it is enabled. So it probably wouldn't be able to distinguish between users with using enhanced security configuration and users that simply have JS/ActiveX disabled or use a Browser that doesn't support scripting in the first place.

Ben Schwehn