There are 4 different exclusion lists in Windows Parental Controls that are used to control which programs and which urls are allowed to be connected to. The two main lists are the HttpExemptionList and the UrlExemptionList, these are modifiable lists than can be added to by installation programs to put themselves into the excluded programs list or to allow specific urls. There are also two read only lists, the WinHttpEmptionList and the WinUrlExemptionList, these lists contain programs and urls that cannot be added or removed using WMI. They are inbuilt system programs and urls that are required for the system to operate correctly.
You can see all four lists through the WMI interface, I showed you how to see the first two lists in a previous blog entry. Displaying the second two is the same thing, just using the other WMI entry names. I updated the script to also show the windows readonly blocked items.
Here is the output from the script:
App Exmemption list:C:\Program Files\Windows Media Player\Wmpconfig.exeC:\Program Files\Windows Media Player\Wmpshare.exeC:\Program Files\Windows Media Player\Wmpnetwk.exeC:\Program Files\Windows Media Player\Wmpsideshowgadget.exeC:\Program Files\Windows Media Player\wmplayer.exeC:\Program Files\Windows Media Player\Wmpenc.exeC:\Program Files\Windows Media Player\Wmlaunch.exeC:\Program Files\Windows Media Player\Wmpnscfg.exeC:\Program Files\Windows Media Player\Wmprph.exe
Windows (readonly) App Exmemption list:C:\Windows\eHome\MCUpdate.exeC:\Windows\HelpPane.exeC:\Windows\eHome\ehrec.exe
Url Exmemption list:http://drmlicense.one.microsoft.comhttp://preview.services.wmdrm.windowsmedia.comhttp://services.wmdrm.windowsmedia.com
Windows (readonly) Url Exmemption list:http://go.microsoft.com/fwlink/http://games.metaservices.microsoft.comhttp://images.metaservices.microsoft.comhttp://www.microsoft.com/library/media/1033/windowsvista/images/shield.pnghttp://oca.microsoft.comhttp://wer.microsoft.comhttp://www.microsoft.com/windowsvista/images/lockedout_uncompressed48.png
Here is what the script looks like: