33
1 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12

IT103Microsoft Windows XP/OS Chap12

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: IT103Microsoft Windows XP/OS Chap12

11

MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY

Chapter 12

Page 2: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 2

OVERVIEW

Configure Internet connections in Internet Explorer

Connect to resources using Internet Explorer

Configure and manage Internet Explorer security settings

Configure and manage Internet Explorer privacy settings

Audit and control add-on programs and browser helper objects with Add-On Manager

Page 3: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 3

MANAGING INTERNET EXPLORER CONNECTIONS

Using the New Connection Wizard Dial-up

Broadband

Managing connection settings Local area network (LAN)

Proxy

Page 4: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 4

NEW CONNECTION WIZARD (DIAL-UP)

Page 5: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 5

NEW CONNECTION WIZARD (BROADBAND)

Page 6: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 6

CONFIGURING LAN AND PROXY SERVER CONNECTIONS

Page 7: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 7

CONNECTING TO INTERNET RESOURCES

Uniform Resource Locators (URLs) Example: An Internet address (for example,

http://www.CT.gov/dmv), usually consisting of the access protocol (http), the domain name (www.CT.gov), and optionally the path to a file or resource residing on that server (dmv).

Web site resources

Using FTP resources

Connecting to Web folders

Page 8: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 8

UNIFORM RESOURCE LOCATORS

Page 9: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 9

WEB SITE RESOURCES

HTML documents

Active content

Streaming media

Web-based applications

Page 10: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 10

USING FTP

Page 11: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 11

WEB FOLDERS

Page 12: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 12

INTERNET EXPLORER SECURITY

URL actions

Web content zones

Advanced security options

Page 13: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 13

URL ACTIONS (SECURITY SETTINGS)

Page 14: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 14

WEB CONTENT ZONES (SECURITY ZONES)

Restricted

Internet

Local Intranet

Trusted Sites

Locked-Down Local Machine

Local Machine

Page 15: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 15

CONFIGURING ZONE SECURITY

Page 16: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 16

POLICY–BASED SECURITY MANAGEMENT

Page 17: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 17

ADVANCED SECURITY SETTINGS

Page 18: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 18

MANAGING PRIVACY SETTINGS IN INTERNET EXPLORER

Cookies

Pop-Up Blocker

Internet caching

Browser history

AutoComplete

Password caching

Page 19: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 19

…Notes…

Privacy is, in many ways, more important than security. Hacked systems that have damaged files or are overrun by viruses can be reformatted and reinstalled. The loss of trade secrets and personal data can do irreparable damage to a company’s (or an individual’s) reputation.

Page 20: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 20

TYPES OF COOKIES

Definition - a packet of information sent by a server to a World Wide Web browser and then sent back by the browser each time it accesses that server.

Persistent - used to collect identifying information about the user

Session - stored in temporary memory and is not retained after the browser is closed. Session cookies do not collect information from the user’s computer.

Page 21: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 21

TYPES OF COOKIES

First-party & Third-party

First-party cookies are cookies that are associated with the host domain.

Third-party cookies are cookies from any other domain.

Page 22: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 22

MANAGING COOKIES

Page 23: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 23

BLOCKING POP-UPS

Page 24: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 24

MANAGING TEMPORARY INTERNET FILES

Page 25: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 25

MANAGING BROWSER HISTORY

Page 26: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 26

CLEARING BROWSER CACHE AND HISTORY

Page 27: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 27

AUTOCOMPLETE

Page 28: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 28

INTERNET EXPLORER PASSWORD CACHE

Page 29: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 29

CONTROLLING ADD-ON PROGRAMS

Add-on programs and ActiveX controls extend Internet Explorer.

Browser helper objects (BHOs) control browser operation.

You can manage add-ons and BHOs with Add-On Manager.

Page 30: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 30

More Detail…

Browser add-on applications and BHOs are designed to extend and control the capabilities of Internet Explorer. They also can be designed to control Internet Explorer for malicious purposes. Many forms of Internet spyware are add-ons or BHOs.

Add-On Manager helps control the add-on and BHO applications on a system. If time permits, demonstrate using Add-On Manager. Describe how it is used to disable BHOs and other add-ons.

Page 31: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 31

USING ADD-ON MANAGER

Page 32: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 32

SUMMARY

Internet Explorer supports many Internet connection types.

Proxy and LAN settings might have to be set manually.

URLs help locate Internet content.

Internet Explorer uses Web content zones to define security.

Cookies are small files used to store preferences or personal data.

Page 33: IT103Microsoft Windows XP/OS Chap12

Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 33

SUMMARY (CONTINUED)

The Temporary Internet Files folder caches Web pages to speed browsing.

Browser history and other data can be cleared to protect privacy.

You can use Add-On Manager to control add-ons and BHOs.