11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.
-
Upload
simon-stafford -
Category
Documents
-
view
218 -
download
1
Transcript of 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.
11
MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
Chapter 12
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 2
OVERVIEW
Configure Internet connections in Internet Explorer
Connect to resources using Internet Explorer
Configure and manage Internet Explorer security settings
Configure and manage Internet Explorer privacy settings
Audit and control add-on programs and browser helper objects with Add-On Manager
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 3
MANAGING INTERNET EXPLORER CONNECTIONS
Using the New Connection Wizard Dial-up
Broadband
Managing connection settings Local area network (LAN)
Proxy
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 4
NEW CONNECTION WIZARD (DIAL-UP)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 5
NEW CONNECTION WIZARD (BROADBAND)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 6
CONFIGURING LAN AND PROXY SERVER CONNECTIONS
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 7
CONNECTING TO INTERNET RESOURCES
Uniform Resource Locators (URLs)
Web site resources
Using FTP resources
Connecting to Web folders
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 8
UNIFORM RESOURCE LOCATORS
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 9
WEB SITE RESOURCES
HTML documents
Active content
Streaming media
Web-based applications
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 10
USING FTP
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 11
WEB FOLDERS
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 12
INTERNET EXPLORER SECURITY
URL actions
Web content zones
Advanced security options
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 13
URL ACTIONS (SECURITY SETTINGS)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 14
WEB CONTENT ZONES (SECURITY ZONES)
Restricted
Internet
Local Intranet
Trusted Sites
Locked-Down Local Machine
Local Machine
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 15
CONFIGURING ZONE SECURITY
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 16
POLICY–BASED SECURITY MANAGEMENT
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 17
ADVANCED SECURITY SETTINGS
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 18
MANAGING PRIVACY SETTINGS IN INTERNET EXPLORER
Cookies
Pop-Up Blocker
Internet caching
Browser history
AutoComplete
Password caching
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 19
TYPES OF COOKIES
Persistent
Session
First-party
Third-party
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 20
MANAGING COOKIES
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 21
BLOCKING POP-UPS
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 22
MANAGING TEMPORARY INTERNET FILES
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 23
MANAGING BROWSER HISTORY
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 24
CLEARING BROWSER CACHE AND HISTORY
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 25
AUTOCOMPLETE
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 26
INTERNET EXPLORER PASSWORD CACHE
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 27
CONTROLLING ADD-ON PROGRAMS
Add-on programs and ActiveX controls extend Internet Explorer.
Browser helper objects (BHOs) control browser operation.
You can manage add-ons and BHOs with Add-On Manager.
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 28
USING ADD-ON MANAGER
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 29
SUMMARY
Internet Explorer supports many Internet connection types.
Proxy and LAN settings might have to be set manually.
URLs help locate Internet content.
Internet Explorer uses Web content zones to define security.
Cookies are small files used to store preferences or personal data.
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 30
SUMMARY (CONTINUED)
The Temporary Internet Files folder caches Web pages to speed browsing.
Browser history and other data can be cleared to protect privacy.
You can use Add-On Manager to control add-ons and BHOs.