11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

30
1 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12

Transcript of 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Page 1: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

11

MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY

Chapter 12

Page 2: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 2

OVERVIEW

Configure Internet connections in Internet Explorer

Connect to resources using Internet Explorer

Configure and manage Internet Explorer security settings

Configure and manage Internet Explorer privacy settings

Audit and control add-on programs and browser helper objects with Add-On Manager

Page 3: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 3

MANAGING INTERNET EXPLORER CONNECTIONS

Using the New Connection Wizard Dial-up

Broadband

Managing connection settings Local area network (LAN)

Proxy

Page 4: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 4

NEW CONNECTION WIZARD (DIAL-UP)

Page 5: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 5

NEW CONNECTION WIZARD (BROADBAND)

Page 6: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 6

CONFIGURING LAN AND PROXY SERVER CONNECTIONS

Page 7: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 7

CONNECTING TO INTERNET RESOURCES

Uniform Resource Locators (URLs)

Web site resources

Using FTP resources

Connecting to Web folders

Page 8: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 8

UNIFORM RESOURCE LOCATORS

Page 9: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 9

WEB SITE RESOURCES

HTML documents

Active content

Streaming media

Web-based applications

Page 10: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 10

USING FTP

Page 11: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 11

WEB FOLDERS

Page 12: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 12

INTERNET EXPLORER SECURITY

URL actions

Web content zones

Advanced security options

Page 13: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 13

URL ACTIONS (SECURITY SETTINGS)

Page 14: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 14

WEB CONTENT ZONES (SECURITY ZONES)

Restricted

Internet

Local Intranet

Trusted Sites

Locked-Down Local Machine

Local Machine

Page 15: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 15

CONFIGURING ZONE SECURITY

Page 16: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 16

POLICY–BASED SECURITY MANAGEMENT

Page 17: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 17

ADVANCED SECURITY SETTINGS

Page 18: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 18

MANAGING PRIVACY SETTINGS IN INTERNET EXPLORER

Cookies

Pop-Up Blocker

Internet caching

Browser history

AutoComplete

Password caching

Page 19: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 19

TYPES OF COOKIES

Persistent

Session

First-party

Third-party

Page 20: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 20

MANAGING COOKIES

Page 21: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 21

BLOCKING POP-UPS

Page 22: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 22

MANAGING TEMPORARY INTERNET FILES

Page 23: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 23

MANAGING BROWSER HISTORY

Page 24: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 24

CLEARING BROWSER CACHE AND HISTORY

Page 25: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 25

AUTOCOMPLETE

Page 26: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 26

INTERNET EXPLORER PASSWORD CACHE

Page 27: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 27

CONTROLLING ADD-ON PROGRAMS

Add-on programs and ActiveX controls extend Internet Explorer.

Browser helper objects (BHOs) control browser operation.

You can manage add-ons and BHOs with Add-On Manager.

Page 28: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 28

USING ADD-ON MANAGER

Page 29: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 29

SUMMARY

Internet Explorer supports many Internet connection types.

Proxy and LAN settings might have to be set manually.

URLs help locate Internet content.

Internet Explorer uses Web content zones to define security.

Cookies are small files used to store preferences or personal data.

Page 30: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 30

SUMMARY (CONTINUED)

The Temporary Internet Files folder caches Web pages to speed browsing.

Browser history and other data can be cleared to protect privacy.

You can use Add-On Manager to control add-ons and BHOs.