NetTech Solutions Supporting Internet Explorer in Windows XP Lesson Eleven.
Module 5: Configuring Internet Explorer and Supporting Applications.
-
Upload
hilary-may -
Category
Documents
-
view
218 -
download
0
Transcript of Module 5: Configuring Internet Explorer and Supporting Applications.
Module 5: Configuring Internet Explorer and
Supporting Applications
Overview
Configuring Security and Connection Settings for Internet Explorer
Customizing and Deploying Internet Explorer Settings
Supporting Applications in Windows XP Professional
Lesson: Configuring Security and Connection Settings for Internet Explorer
Components of a Secure Internet Connection
Security Zones for Internet Explorer
Connection Settings for Internet Explorer
Service Pack 2 Enhancements to Internet Explorer
How to Block Pop-Ups
How to Block Untrusted Publishers
How to Manage Add-Ons
Components of a Secure Internet Connection
Client Computers
Client Computers
InternetProxy Server Firewall
Internet Explorer settings can support an organization’s policy on Internet and Intranet access
Internet Explorer settings can support an organization’s policy on Internet and Intranet access
Internet Explorer settings can augment network security infrastructureInternet Explorer settings can augment network security infrastructure
Proxy server can control access to sensitive informationProxy server can control access to sensitive information
Security Zones for Internet Explorer
Local intranet zone: Assign a low security level to allow users to run active content
Internet zone: Assign a higher security level to prevent users from running active content and downloading code• Trusted sites zone. If there are specific sites that you
trust, assign trust to individual URLs or entire domains• Restricted sites zone. If there are specific sites on the
Internet that contain potentially harmful Web content, assign the highest restrictions
Local intranet zone: Assign a low security level to allow users to run active content
Internet zone: Assign a higher security level to prevent users from running active content and downloading code• Trusted sites zone. If there are specific sites that you
trust, assign trust to individual URLs or entire domains• Restricted sites zone. If there are specific sites on the
Internet that contain potentially harmful Web content, assign the highest restrictions
Connection Settings for Internet Explorer
Identify the connection to use when you connect to the Internet, RAS, and other services
Specify the proxy server and settings for your Internet connection
Identify the connection to use when you connect to the Internet, RAS, and other services
Specify the proxy server and settings for your Internet connection
Service Pack 2 Enhancements to Internet Explorer
Pop-up Blocker
Untrusted Publisher Blocker
Add-on Management
Information Bar
Pop-up Blocker
Untrusted Publisher Blocker
Add-on Management
Information Bar
How to Block Pop-Ups
Configure settingsConfigure settings
Turn on Pop-up Blocker
Turn on Pop-up Blocker
How to Block Untrusted Publishers
Block publisher’s certificateBlock publisher’s certificate
Unblock selected certificatesUnblock selected certificates
How to Manage Add-Ons
Show list of add-ons
Enable or disable add-ons
Update ActiveX add-on components
Show list of add-ons
Enable or disable add-ons
Update ActiveX add-on components
Practice: Configuring Security Settings for Internet Explorer
Examine default Internet Explorer security settings
Configure security settings for Internet Explorer
Examine default Internet Explorer security settings
Configure security settings for Internet Explorer
11
22
Lesson: Customizing and Deploying Internet Explorer Settings
Methods for Customizing and Deploying Internet Explorer Settings
How to Customize Internet Explorer
What Is the GPMC?
Guidelines for Configuring Internet Explorer
Methods for Customizing and Deploying Internet Explorer Settings
Internet Explorer Administration Kit
Group Policy
Creates custom installation packagesCreates custom installation packages
Creates update packagesCreates update packages
Enforces Internet Explorer settingsEnforces Internet Explorer settings
Use Group Policy to maintain Internet Explorer settingsUse Group Policy to maintain Internet Explorer settings
Use Internet Explorer options to configure settings on new computers running Windows
Use Internet Explorer options to configure settings on new computers running Windows
Use the IEAK to create and deploy custom browser packages on existing computers running Windows
Use the IEAK to create and deploy custom browser packages on existing computers running Windows
How to Customize Internet Explorer
Use the Internet Explorer Customization Wizard to configure security zones
Create Flat output
Use the Internet Explorer Customization Wizard to configure security zones
Create Flat output
11
22
Practice: Configuring Internet Explorer Settings by Using Internet Explorer Customization Wizard
What Is the GPMC?
The GPMC provides:The GPMC provides:
Simplified management of Group PolicySimplified management of Group Policy
A single solution for multiple Group Policy tasksA single solution for multiple Group Policy tasks
View Internet Explorer computer configuration
View Internet Explorer user configuration
Set security zones
View Internet Explorer computer configuration
View Internet Explorer user configuration
Set security zones
11
22
33
Practice: Managing Group Policy by Using the GPMC
Guidelines for Configuring Internet Explorer
Restrict active contentRestrict active content
Restrict cookiesRestrict cookies
Use an online virus checker Use an online virus checker
Disable users’ ability to change Internet Explorer security-related settingsDisable users’ ability to change Internet Explorer security-related settings
Lesson: Supporting Applications in Windows XP Professional
What Is Add or Remove Programs Filtering?
What Is Program Compatibility?
How to Use Program Compatibility
What Is Dr. Watson?
How to Configure Dr. Watson
What Is Add or Remove Programs Filtering?
Show or hide updates in the installed programs list
What Is Program Compatibility?
Program Compatibility enables many programs written for earlier versions of Windows to operate on computers running Windows XP Professional
Program Compatibility enables many programs written for earlier versions of Windows to operate on computers running Windows XP Professional
You can set Program Compatibility by:You can set Program Compatibility by:
Using the Program Compatibility WizardUsing the Program Compatibility Wizard
Manually setting compatibility propertiesManually setting compatibility properties
How to Use Program Compatibility
What Is Dr. Watson?
Error data is stored in a text
file, Drwtsn32.log
Error data is stored in a text
file, Drwtsn32.log
The crash dump file is a binary file that can be
loaded into a debugger
The crash dump file is a binary file that can be
loaded into a debugger
Dr. Watson is a Windows utility that detects information about system and application failures and records that information in a log file
Dr. Watson is a Windows utility that detects information about system and application failures and records that information in a log file
The Application Errors window
displays all program errors
The Application Errors window
displays all program errors
How to Configure Dr. Watson
Use the Dr. Watson dialog box to configure settings
Use the Dr. Watson dialog box to view the log file
Open the log file manually
Practice: Configuring Dr. Watson
Open the Dr. Watson dialog box
View the Dr. Watson log file
Open the Dr. Watson dialog box
View the Dr. Watson log file
11
22
Course Evaluation