module 5: configuring internet explorer and supporting applications

Post on 03-Jan-2016

224 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Module 5: Configuring Internet Explorer and

Supporting Applications

Overview

Configuring Security and Connection Settings for Internet Explorer

Customizing and Deploying Internet Explorer Settings

Supporting Applications in Windows XP Professional

Lesson: Configuring Security and Connection Settings for Internet Explorer

Components of a Secure Internet Connection

Security Zones for Internet Explorer

Connection Settings for Internet Explorer

Service Pack 2 Enhancements to Internet Explorer

How to Block Pop-Ups

How to Block Untrusted Publishers

How to Manage Add-Ons

Components of a Secure Internet Connection

Client Computers

Client Computers

InternetProxy Server Firewall

Internet Explorer settings can support an organization’s policy on Internet and Intranet access

Internet Explorer settings can support an organization’s policy on Internet and Intranet access

Internet Explorer settings can augment network security infrastructureInternet Explorer settings can augment network security infrastructure

Proxy server can control access to sensitive informationProxy server can control access to sensitive information

Security Zones for Internet Explorer

Local intranet zone: Assign a low security level to allow users to run active content

Internet zone: Assign a higher security level to prevent users from running active content and downloading code• Trusted sites zone. If there are specific sites that you

trust, assign trust to individual URLs or entire domains• Restricted sites zone. If there are specific sites on the

Internet that contain potentially harmful Web content, assign the highest restrictions

Local intranet zone: Assign a low security level to allow users to run active content

Internet zone: Assign a higher security level to prevent users from running active content and downloading code• Trusted sites zone. If there are specific sites that you

trust, assign trust to individual URLs or entire domains• Restricted sites zone. If there are specific sites on the

Internet that contain potentially harmful Web content, assign the highest restrictions

Connection Settings for Internet Explorer

Identify the connection to use when you connect to the Internet, RAS, and other services

Specify the proxy server and settings for your Internet connection

Identify the connection to use when you connect to the Internet, RAS, and other services

Specify the proxy server and settings for your Internet connection

Service Pack 2 Enhancements to Internet Explorer

Pop-up Blocker

Untrusted Publisher Blocker

Add-on Management

Information Bar

Pop-up Blocker

Untrusted Publisher Blocker

Add-on Management

Information Bar

How to Block Pop-Ups

Configure settingsConfigure settings

Turn on Pop-up Blocker

Turn on Pop-up Blocker

How to Block Untrusted Publishers

Block publisher’s certificateBlock publisher’s certificate

Unblock selected certificatesUnblock selected certificates

How to Manage Add-Ons

Show list of add-ons

Enable or disable add-ons

Update ActiveX add-on components

Show list of add-ons

Enable or disable add-ons

Update ActiveX add-on components

Practice: Configuring Security Settings for Internet Explorer

Examine default Internet Explorer security settings

Configure security settings for Internet Explorer

Examine default Internet Explorer security settings

Configure security settings for Internet Explorer

11

22

Lesson: Customizing and Deploying Internet Explorer Settings

Methods for Customizing and Deploying Internet Explorer Settings

How to Customize Internet Explorer

What Is the GPMC?

Guidelines for Configuring Internet Explorer

Methods for Customizing and Deploying Internet Explorer Settings

Internet Explorer Administration Kit

Group Policy

Creates custom installation packagesCreates custom installation packages

Creates update packagesCreates update packages

Enforces Internet Explorer settingsEnforces Internet Explorer settings

Use Group Policy to maintain Internet Explorer settingsUse Group Policy to maintain Internet Explorer settings

Use Internet Explorer options to configure settings on new computers running Windows

Use Internet Explorer options to configure settings on new computers running Windows

Use the IEAK to create and deploy custom browser packages on existing computers running Windows

Use the IEAK to create and deploy custom browser packages on existing computers running Windows

How to Customize Internet Explorer

Use the Internet Explorer Customization Wizard to configure security zones

Create Flat output

Use the Internet Explorer Customization Wizard to configure security zones

Create Flat output

11

22

Practice: Configuring Internet Explorer Settings by Using Internet Explorer Customization Wizard

What Is the GPMC?

The GPMC provides:The GPMC provides:

Simplified management of Group PolicySimplified management of Group Policy

A single solution for multiple Group Policy tasksA single solution for multiple Group Policy tasks

View Internet Explorer computer configuration

View Internet Explorer user configuration

Set security zones

View Internet Explorer computer configuration

View Internet Explorer user configuration

Set security zones

11

22

33

Practice: Managing Group Policy by Using the GPMC

Guidelines for Configuring Internet Explorer

Restrict active contentRestrict active content

Restrict cookiesRestrict cookies

Use an online virus checker Use an online virus checker

Disable users’ ability to change Internet Explorer security-related settingsDisable users’ ability to change Internet Explorer security-related settings

Lesson: Supporting Applications in Windows XP Professional

What Is Add or Remove Programs Filtering?

What Is Program Compatibility?

How to Use Program Compatibility

What Is Dr. Watson?

How to Configure Dr. Watson

What Is Add or Remove Programs Filtering?

Show or hide updates in the installed programs list

What Is Program Compatibility?

Program Compatibility enables many programs written for earlier versions of Windows to operate on computers running Windows XP Professional

Program Compatibility enables many programs written for earlier versions of Windows to operate on computers running Windows XP Professional

You can set Program Compatibility by:You can set Program Compatibility by:

Using the Program Compatibility WizardUsing the Program Compatibility Wizard

Manually setting compatibility propertiesManually setting compatibility properties

How to Use Program Compatibility

What Is Dr. Watson?

Error data is stored in a text

file, Drwtsn32.log

Error data is stored in a text

file, Drwtsn32.log

The crash dump file is a binary file that can be

loaded into a debugger

The crash dump file is a binary file that can be

loaded into a debugger

Dr. Watson is a Windows utility that detects information about system and application failures and records that information in a log file

Dr. Watson is a Windows utility that detects information about system and application failures and records that information in a log file

The Application Errors window

displays all program errors

The Application Errors window

displays all program errors

How to Configure Dr. Watson

Use the Dr. Watson dialog box to configure settings

Use the Dr. Watson dialog box to view the log file

Open the log file manually

Practice: Configuring Dr. Watson

Open the Dr. Watson dialog box

View the Dr. Watson log file

Open the Dr. Watson dialog box

View the Dr. Watson log file

11

22

Course Evaluation

top related