Dynamic Script Support
You can specify, explicitly or with wildcards, one or more URLs that will permit the execution of non-whitelisted scripts within Microsoft Internet Explorer.
This setting will apply to all users, and is only supported when using Microsoft Internet Explorer.
To enable script execution from a specific URL, you must use the sxopt command line utility to insert the URL into the Ivanti Device and Application Control database.
When specifying a URL, the following wildcards are available:
- % - the % character can be used to match zero or more characters, ending with the dot (.) character.
For example, http://%domain.com would allow non-whitelisted scripts from http://domain.com, http://www.domain.com, or http://subdomain.domain.com, but scripts from http://mydomain.com would continue to be blocked.
- * - the * character can be used to match any number of characters.
- For example, http://msdn.microsoft.com* would allow any characters following the .com, such as http://msdn.microsoft.com/en-us/library/ms143506.aspx.
The following usage example enables the execution of non-whitelisted scripts from any secure (https) Microsoft website.
sxopt <SXS> -ca -s 80 https://%microsoft.com*