%3CLINGO-SUB%20id%3D%22lingo-sub-1777563%22%20slang%3D%22en-US%22%3EDisabling%20legacy%20scripting%20engine%20JScript%20in%20Internet%20Explorer%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1777563%22%20slang%3D%22en-US%22%3E%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3ETo%20help%20you%20provide%20a%20more%20secure%20browsing%20experience%20across%20your%20organization%2C%20the%20October%202020%20monthly%20security%20updates%20for%20Windows%20and%20Windows%20Server%20introduce%20an%20option%20to%20block%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fprevious-versions%2Fhbxc2t98(v%3Dvs.85)%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EJscript%3C%2FA%3E%20(Jscript.dll)%20execution%20in%20Internet%20Explorer%2011.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EJscript%20is%20a%20legacy%20Microsoft%20implementation%20of%20the%20ECMA%20262%20language%20specification.%20Blocking%20Jscript%20helps%20protect%20against%20malicious%20actors%20targeting%20the%20JScript%20scripting%20engine%20while%20maintaining%20user%20productivity%20as%20core%20services%20continue%20to%20function%20as%20usual.%3C%2FP%3E%0A%3CH2%20style%3D%22margin-top%3A%2036px%3B%20margin-bottom%3A%2020px%3B%20font-family%3A%20'Segoe%20UI'%2C%20Segoe%2C%20Tahoma%2C%20Geneva%2C%20sans-serif%3B%20font-weight%3A%20600%3B%20font-size%3A%2020px%3B%20color%3A%20%23333333%3B%22%20id%3D%22toc-hId--1238013300%22%20id%3D%22toc-hId--1238012372%22%20id%3D%22toc-hId--1238012372%22%20id%3D%22toc-hId--1238012372%22%20id%3D%22toc-hId--1238012372%22%20id%3D%22toc-hId--1238012372%22%3ERecommended%20actions%3C%2FH2%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EAs%20a%20security%20best%20practice%2C%20we%20recommend%20that%20users%20disable%20the%20legacy%20JScript%20execution%20for%20websites%20in%20the%20%3CSTRONG%3EInternet%20%3C%2FSTRONG%3Eand%20%3CSTRONG%3ERestricted%20Sites%20%3C%2FSTRONG%3Ezones.%20Details%20on%20how%20to%20configure%20this%20behavior%20can%20be%20found%20in%20the%20following%20article%3A%20%3CA%20href%3D%22https%3A%2F%2Fsupport.microsoft.com%2Fhelp%2F4586060%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EOption%20to%20disable%20JScript%20execution%20in%20Internet%20Explorer%20(KB4586060)%3C%2FA%3E.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EMicrosoft%20will%20continue%20to%20provide%20security%20updates%20for%20JScript%20via%20the%20latest%20cumulative%20updates%20for%20Windows%2010%2C%20and%20Cumulative%20Updates%20for%20Internet%20Explorer%2011%20or%20Monthly%20Rollups%20for%20Windows%208.1%2C%20Windows%20Server%202012%2C%20and%20Windows%20Embedded%208%20Standard.%20If%20you%20have%20%3CBR%20%2F%3Eautomatic%20updates%20enabled%2C%20updates%20will%20be%20automatically%20downloaded%20and%20installed%20on%20your%20users'%20devices.%20If%20you%20have%20disabled%20automatic%20updates%20for%20your%20organization%2C%20you%20will%20need%20to%20check%20for%20updates%20and%20install%20them%20manually.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1777563%22%20slang%3D%22en-US%22%3E%3CP%3ELearn%20how%20to%20block%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fprevious-versions%2Fhbxc2t98(v%3Dvs.85)%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EJscript%3C%2FA%3E%26nbsp%3Bexecution%20in%20Internet%20Explorer%2011%20to%20support%20a%20more%20secure%20browsing%20experience.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22developer2.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F226525i396DBA71FA35808E%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22developer2.png%22%20alt%3D%22developer2.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1777563%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EServicing%20and%20updates%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1867236%22%20slang%3D%22en-US%22%3ERe%3A%20Disabling%20legacy%20scripting%20engine%20JScript%20in%20Internet%20Explorer%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1867236%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20knowledge%20base%20says%20that%20older%20devices%20must%20be%20configured%20with%20a%20feature%20control%20key%2C%20but%20nowhere%20does%20it%20say%20the%20name%20of%20the%20registry%20to%20set.%3C%2FP%3E%3CP%3EAnd%20there's%20something%20wrong%20with%20the%20registry%20name%20you%20set%20in%20the%20WOW6432Node.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1873037%22%20slang%3D%22en-US%22%3ERe%3A%20Disabling%20legacy%20scripting%20engine%20JScript%20in%20Internet%20Explorer%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1873037%22%20slang%3D%22en-US%22%3E%3CP%3EThis%20is%20great%20decision%20and%20script%20are%20source%20of%20several%20malicious%20activities%20in%20system%20and%20this%20would%20block%20several%20known%20and%20unknown%20attacks.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

To help you provide a more secure browsing experience across your organization, the October 2020 monthly security updates for Windows and Windows Server introduce an option to block Jscript (Jscript.dll) execution in Internet Explorer 11.

Jscript is a legacy Microsoft implementation of the ECMA 262 language specification. Blocking Jscript helps protect against malicious actors targeting the JScript scripting engine while maintaining user productivity as core services continue to function as usual.

Recommended actions

As a security best practice, we recommend that users disable the legacy JScript execution for websites in the Internet and Restricted Sites zones. Details on how to configure this behavior can be found in the following article: Option to disable JScript execution in Internet Explorer (KB4586060).

Microsoft will continue to provide security updates for JScript via the latest cumulative updates for Windows 10, and Cumulative Updates for Internet Explorer 11 or Monthly Rollups for Windows 8.1, Windows Server 2012, and Windows Embedded 8 Standard. If you have
automatic updates enabled, updates will be automatically downloaded and installed on your users' devices. If you have disabled automatic updates for your organization, you will need to check for updates and install them manually.

2 Comments
Senior Member

The knowledge base says that older devices must be configured with a feature control key, but nowhere does it say the name of the registry to set.

And there's something wrong with the registry name you set in the WOW6432Node.

Valued Contributor

This is great decision and script are source of several malicious activities in system and this would block several known and unknown attacks.