26
Module 5: Configuring Internet Explorer and Supporting Applications

Module 5: Configuring Internet Explorer and Supporting Applications

Embed Size (px)

Citation preview

Page 1: Module 5: Configuring Internet Explorer and Supporting Applications

Module 5: Configuring Internet Explorer and

Supporting Applications

Page 2: Module 5: Configuring Internet Explorer and Supporting Applications

Overview

Configuring Security and Connection Settings for Internet Explorer

Customizing and Deploying Internet Explorer Settings

Supporting Applications in Windows XP Professional

Page 3: Module 5: Configuring Internet Explorer and Supporting Applications

Lesson: Configuring Security and Connection Settings for Internet Explorer

Components of a Secure Internet Connection

Security Zones for Internet Explorer

Connection Settings for Internet Explorer

Service Pack 2 Enhancements to Internet Explorer

How to Block Pop-Ups

How to Block Untrusted Publishers

How to Manage Add-Ons

Page 4: Module 5: Configuring Internet Explorer and Supporting Applications

Components of a Secure Internet Connection

Client Computers

Client Computers

InternetProxy Server Firewall

Internet Explorer settings can support an organization’s policy on Internet and Intranet access

Internet Explorer settings can support an organization’s policy on Internet and Intranet access

Internet Explorer settings can augment network security infrastructureInternet Explorer settings can augment network security infrastructure

Proxy server can control access to sensitive informationProxy server can control access to sensitive information

Page 5: Module 5: Configuring Internet Explorer and Supporting Applications

Security Zones for Internet Explorer

Local intranet zone: Assign a low security level to allow users to run active content

Internet zone: Assign a higher security level to prevent users from running active content and downloading code• Trusted sites zone. If there are specific sites that you

trust, assign trust to individual URLs or entire domains• Restricted sites zone. If there are specific sites on the

Internet that contain potentially harmful Web content, assign the highest restrictions

Local intranet zone: Assign a low security level to allow users to run active content

Internet zone: Assign a higher security level to prevent users from running active content and downloading code• Trusted sites zone. If there are specific sites that you

trust, assign trust to individual URLs or entire domains• Restricted sites zone. If there are specific sites on the

Internet that contain potentially harmful Web content, assign the highest restrictions

Page 6: Module 5: Configuring Internet Explorer and Supporting Applications

Connection Settings for Internet Explorer

Identify the connection to use when you connect to the Internet, RAS, and other services

Specify the proxy server and settings for your Internet connection

Identify the connection to use when you connect to the Internet, RAS, and other services

Specify the proxy server and settings for your Internet connection

Page 7: Module 5: Configuring Internet Explorer and Supporting Applications

Service Pack 2 Enhancements to Internet Explorer

Pop-up Blocker

Untrusted Publisher Blocker

Add-on Management

Information Bar

Pop-up Blocker

Untrusted Publisher Blocker

Add-on Management

Information Bar

Page 8: Module 5: Configuring Internet Explorer and Supporting Applications

How to Block Pop-Ups

Configure settingsConfigure settings

Turn on Pop-up Blocker

Turn on Pop-up Blocker

Page 9: Module 5: Configuring Internet Explorer and Supporting Applications

How to Block Untrusted Publishers

Block publisher’s certificateBlock publisher’s certificate

Unblock selected certificatesUnblock selected certificates

Page 10: Module 5: Configuring Internet Explorer and Supporting Applications

How to Manage Add-Ons

Show list of add-ons

Enable or disable add-ons

Update ActiveX add-on components

Show list of add-ons

Enable or disable add-ons

Update ActiveX add-on components

Page 11: Module 5: Configuring Internet Explorer and Supporting Applications

Practice: Configuring Security Settings for Internet Explorer

Examine default Internet Explorer security settings

Configure security settings for Internet Explorer

Examine default Internet Explorer security settings

Configure security settings for Internet Explorer

11

22

Page 12: Module 5: Configuring Internet Explorer and Supporting Applications

Lesson: Customizing and Deploying Internet Explorer Settings

Methods for Customizing and Deploying Internet Explorer Settings

How to Customize Internet Explorer

What Is the GPMC?

Guidelines for Configuring Internet Explorer

Page 13: Module 5: Configuring Internet Explorer and Supporting Applications

Methods for Customizing and Deploying Internet Explorer Settings

Internet Explorer Administration Kit

Group Policy

Creates custom installation packagesCreates custom installation packages

Creates update packagesCreates update packages

Enforces Internet Explorer settingsEnforces Internet Explorer settings

Page 14: Module 5: Configuring Internet Explorer and Supporting Applications

Use Group Policy to maintain Internet Explorer settingsUse Group Policy to maintain Internet Explorer settings

Use Internet Explorer options to configure settings on new computers running Windows

Use Internet Explorer options to configure settings on new computers running Windows

Use the IEAK to create and deploy custom browser packages on existing computers running Windows

Use the IEAK to create and deploy custom browser packages on existing computers running Windows

How to Customize Internet Explorer

Page 15: Module 5: Configuring Internet Explorer and Supporting Applications

Use the Internet Explorer Customization Wizard to configure security zones

Create Flat output

Use the Internet Explorer Customization Wizard to configure security zones

Create Flat output

11

22

Practice: Configuring Internet Explorer Settings by Using Internet Explorer Customization Wizard

Page 16: Module 5: Configuring Internet Explorer and Supporting Applications

What Is the GPMC?

The GPMC provides:The GPMC provides:

Simplified management of Group PolicySimplified management of Group Policy

A single solution for multiple Group Policy tasksA single solution for multiple Group Policy tasks

Page 17: Module 5: Configuring Internet Explorer and Supporting Applications

View Internet Explorer computer configuration

View Internet Explorer user configuration

Set security zones

View Internet Explorer computer configuration

View Internet Explorer user configuration

Set security zones

11

22

33

Practice: Managing Group Policy by Using the GPMC

Page 18: Module 5: Configuring Internet Explorer and Supporting Applications

Guidelines for Configuring Internet Explorer

Restrict active contentRestrict active content

Restrict cookiesRestrict cookies

Use an online virus checker Use an online virus checker

Disable users’ ability to change Internet Explorer security-related settingsDisable users’ ability to change Internet Explorer security-related settings

Page 19: Module 5: Configuring Internet Explorer and Supporting Applications

Lesson: Supporting Applications in Windows XP Professional

What Is Add or Remove Programs Filtering?

What Is Program Compatibility?

How to Use Program Compatibility

What Is Dr. Watson?

How to Configure Dr. Watson

Page 20: Module 5: Configuring Internet Explorer and Supporting Applications

What Is Add or Remove Programs Filtering?

Show or hide updates in the installed programs list

Page 21: Module 5: Configuring Internet Explorer and Supporting Applications

What Is Program Compatibility?

Program Compatibility enables many programs written for earlier versions of Windows to operate on computers running Windows XP Professional

Program Compatibility enables many programs written for earlier versions of Windows to operate on computers running Windows XP Professional

Page 22: Module 5: Configuring Internet Explorer and Supporting Applications

You can set Program Compatibility by:You can set Program Compatibility by:

Using the Program Compatibility WizardUsing the Program Compatibility Wizard

Manually setting compatibility propertiesManually setting compatibility properties

How to Use Program Compatibility

Page 23: Module 5: Configuring Internet Explorer and Supporting Applications

What Is Dr. Watson?

Error data is stored in a text

file, Drwtsn32.log

Error data is stored in a text

file, Drwtsn32.log

The crash dump file is a binary file that can be

loaded into a debugger

The crash dump file is a binary file that can be

loaded into a debugger

Dr. Watson is a Windows utility that detects information about system and application failures and records that information in a log file

Dr. Watson is a Windows utility that detects information about system and application failures and records that information in a log file

The Application Errors window

displays all program errors

The Application Errors window

displays all program errors

Page 24: Module 5: Configuring Internet Explorer and Supporting Applications

How to Configure Dr. Watson

Use the Dr. Watson dialog box to configure settings

Use the Dr. Watson dialog box to view the log file

Open the log file manually

Page 25: Module 5: Configuring Internet Explorer and Supporting Applications

Practice: Configuring Dr. Watson

Open the Dr. Watson dialog box

View the Dr. Watson log file

Open the Dr. Watson dialog box

View the Dr. Watson log file

11

22

Page 26: Module 5: Configuring Internet Explorer and Supporting Applications

Course Evaluation