![Page 1: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/1.jpg)
Module 5: Configuring Internet Explorer and
Supporting Applications
![Page 2: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/2.jpg)
Overview
Configuring Security and Connection Settings for Internet Explorer
Customizing and Deploying Internet Explorer Settings
Supporting Applications in Windows XP Professional
![Page 3: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/3.jpg)
Lesson: Configuring Security and Connection Settings for Internet Explorer
Components of a Secure Internet Connection
Security Zones for Internet Explorer
Connection Settings for Internet Explorer
Service Pack 2 Enhancements to Internet Explorer
How to Block Pop-Ups
How to Block Untrusted Publishers
How to Manage Add-Ons
![Page 4: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/4.jpg)
Components of a Secure Internet Connection
Client Computers
Client Computers
InternetProxy Server Firewall
Internet Explorer settings can support an organization’s policy on Internet and Intranet access
Internet Explorer settings can support an organization’s policy on Internet and Intranet access
Internet Explorer settings can augment network security infrastructureInternet Explorer settings can augment network security infrastructure
Proxy server can control access to sensitive informationProxy server can control access to sensitive information
![Page 5: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/5.jpg)
Security Zones for Internet Explorer
Local intranet zone: Assign a low security level to allow users to run active content
Internet zone: Assign a higher security level to prevent users from running active content and downloading code• Trusted sites zone. If there are specific sites that you
trust, assign trust to individual URLs or entire domains• Restricted sites zone. If there are specific sites on the
Internet that contain potentially harmful Web content, assign the highest restrictions
Local intranet zone: Assign a low security level to allow users to run active content
Internet zone: Assign a higher security level to prevent users from running active content and downloading code• Trusted sites zone. If there are specific sites that you
trust, assign trust to individual URLs or entire domains• Restricted sites zone. If there are specific sites on the
Internet that contain potentially harmful Web content, assign the highest restrictions
![Page 6: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/6.jpg)
Connection Settings for Internet Explorer
Identify the connection to use when you connect to the Internet, RAS, and other services
Specify the proxy server and settings for your Internet connection
Identify the connection to use when you connect to the Internet, RAS, and other services
Specify the proxy server and settings for your Internet connection
![Page 7: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/7.jpg)
Service Pack 2 Enhancements to Internet Explorer
Pop-up Blocker
Untrusted Publisher Blocker
Add-on Management
Information Bar
Pop-up Blocker
Untrusted Publisher Blocker
Add-on Management
Information Bar
![Page 8: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/8.jpg)
How to Block Pop-Ups
Configure settingsConfigure settings
Turn on Pop-up Blocker
Turn on Pop-up Blocker
![Page 9: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/9.jpg)
How to Block Untrusted Publishers
Block publisher’s certificateBlock publisher’s certificate
Unblock selected certificatesUnblock selected certificates
![Page 10: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/10.jpg)
How to Manage Add-Ons
Show list of add-ons
Enable or disable add-ons
Update ActiveX add-on components
Show list of add-ons
Enable or disable add-ons
Update ActiveX add-on components
![Page 11: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/11.jpg)
Practice: Configuring Security Settings for Internet Explorer
Examine default Internet Explorer security settings
Configure security settings for Internet Explorer
Examine default Internet Explorer security settings
Configure security settings for Internet Explorer
11
22
![Page 12: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/12.jpg)
Lesson: Customizing and Deploying Internet Explorer Settings
Methods for Customizing and Deploying Internet Explorer Settings
How to Customize Internet Explorer
What Is the GPMC?
Guidelines for Configuring Internet Explorer
![Page 13: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/13.jpg)
Methods for Customizing and Deploying Internet Explorer Settings
Internet Explorer Administration Kit
Group Policy
Creates custom installation packagesCreates custom installation packages
Creates update packagesCreates update packages
Enforces Internet Explorer settingsEnforces Internet Explorer settings
![Page 14: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/14.jpg)
Use Group Policy to maintain Internet Explorer settingsUse Group Policy to maintain Internet Explorer settings
Use Internet Explorer options to configure settings on new computers running Windows
Use Internet Explorer options to configure settings on new computers running Windows
Use the IEAK to create and deploy custom browser packages on existing computers running Windows
Use the IEAK to create and deploy custom browser packages on existing computers running Windows
How to Customize Internet Explorer
![Page 15: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/15.jpg)
Use the Internet Explorer Customization Wizard to configure security zones
Create Flat output
Use the Internet Explorer Customization Wizard to configure security zones
Create Flat output
11
22
Practice: Configuring Internet Explorer Settings by Using Internet Explorer Customization Wizard
![Page 16: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/16.jpg)
What Is the GPMC?
The GPMC provides:The GPMC provides:
Simplified management of Group PolicySimplified management of Group Policy
A single solution for multiple Group Policy tasksA single solution for multiple Group Policy tasks
![Page 17: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/17.jpg)
View Internet Explorer computer configuration
View Internet Explorer user configuration
Set security zones
View Internet Explorer computer configuration
View Internet Explorer user configuration
Set security zones
11
22
33
Practice: Managing Group Policy by Using the GPMC
![Page 18: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/18.jpg)
Guidelines for Configuring Internet Explorer
Restrict active contentRestrict active content
Restrict cookiesRestrict cookies
Use an online virus checker Use an online virus checker
Disable users’ ability to change Internet Explorer security-related settingsDisable users’ ability to change Internet Explorer security-related settings
![Page 19: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/19.jpg)
Lesson: Supporting Applications in Windows XP Professional
What Is Add or Remove Programs Filtering?
What Is Program Compatibility?
How to Use Program Compatibility
What Is Dr. Watson?
How to Configure Dr. Watson
![Page 20: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/20.jpg)
What Is Add or Remove Programs Filtering?
Show or hide updates in the installed programs list
![Page 21: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/21.jpg)
What Is Program Compatibility?
Program Compatibility enables many programs written for earlier versions of Windows to operate on computers running Windows XP Professional
Program Compatibility enables many programs written for earlier versions of Windows to operate on computers running Windows XP Professional
![Page 22: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/22.jpg)
You can set Program Compatibility by:You can set Program Compatibility by:
Using the Program Compatibility WizardUsing the Program Compatibility Wizard
Manually setting compatibility propertiesManually setting compatibility properties
How to Use Program Compatibility
![Page 23: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/23.jpg)
What Is Dr. Watson?
Error data is stored in a text
file, Drwtsn32.log
Error data is stored in a text
file, Drwtsn32.log
The crash dump file is a binary file that can be
loaded into a debugger
The crash dump file is a binary file that can be
loaded into a debugger
Dr. Watson is a Windows utility that detects information about system and application failures and records that information in a log file
Dr. Watson is a Windows utility that detects information about system and application failures and records that information in a log file
The Application Errors window
displays all program errors
The Application Errors window
displays all program errors
![Page 24: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/24.jpg)
How to Configure Dr. Watson
Use the Dr. Watson dialog box to configure settings
Use the Dr. Watson dialog box to view the log file
Open the log file manually
![Page 25: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/25.jpg)
Practice: Configuring Dr. Watson
Open the Dr. Watson dialog box
View the Dr. Watson log file
Open the Dr. Watson dialog box
View the Dr. Watson log file
11
22
![Page 26: Module 5: Configuring Internet Explorer and Supporting Applications](https://reader035.vdocuments.mx/reader035/viewer/2022062720/56649efd5503460f94c10d03/html5/thumbnails/26.jpg)
Course Evaluation