How to Configure Custom Search Providers Using the Registry
Search providers are stored in the registry in either the HKEY_CURRENT_USER or HKEY_LOCAL_MACHINE hives at Software\Microsoft\Internet Explorer\SearchScopes. To automate the process of adding search providers to computers, use a test computer to configure the search engines manually, including specifying the default search engine. Then, create a .reg file based on this registry key and its subkeys and distribute it to your client computers.
To create a .reg file, follow these steps:
- To start the Registry Editor, click Start, type Regedit, and then press Enter.
- To configure search engines for individual users, select HKEY_CURRENT_USER \Software\Microsoft\Internet Explorer\SearchScopes. To configure search engines for all users on a computer, select HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes.
- Select Export from the File menu. Save the .reg file.
You can now distribute the .reg file to computers in your organization. To configure the search engines, double-click the .reg file to open the Registry Editor and apply the settings. Unfortunately, this requires administrative credentials. If you need to distribute the updated settings without explicitly providing administrative credentials, have a developer create a Windows Installer package that creates the registry values and distribute the Windows Installer package by using Group Policy software distribution.
In this tutorial:
- Managing Windows Internet Explorer
- Internet Explorer 8 Improvements
- InPrivate Browsing
- InPrivate Filtering
- Compatibility View
- SmartScreen
- Domain Highlighting
- Tab Isolation
- Accelerators
- Improvements Previously Introduced in Internet Explorer 7
- User Interface Changes
- Tabbed Browsing
- Search Bar
- How to Create a Web Link to Add a Custom Search Provider
- How to Configure Custom Search Providers Using the Registry
- How to Configure Custom Search Providers Using Group Policy
- RSS Feeds
- Improved Standards Support
- Expanded Group Policy Settings
- Defending Against Malware
- How Protected Mode Improves Security
- How the Protected Mode Compatibility Layer Works
- How to Solve Protected Mode Incompatibilities
- URL-Handling Protection
- Address Bar Visibility
- Cross-Domain Scripting Attack Protection
- Controlling Browser Add-ons
- Add -on Manager Improvements
- Protecting Against Data Theft
- Security Status Bar
- How the Smart Screen Filter Works
- How to Configure Smart Screen Options
- Deleting Browsing History
- Blocking IDN Spoofing
- Security Zones
- Understanding Zones
- Configuring Zones on the Local Computer
- Configuring Zones Using Group Policy
- Network Protocol Lockdown
- Managing Internet Explorer Using Group Policy
- Group Policy Settings for Internet Explorer 7 and Internet Explorer 8
- New Group Policy Settings for Internet Explorer 8
- Using the Internet Explorer Administration Kit
- Troubleshooting Internet Explorer Problems
- Internet Explorer Does Not Start
- An Add-on Does Not Work Properly
- Some Web Pages Do Not Display Properly
- Preventing Unwanted Toolbars
- The Home Page or Other Settings Have Changed