Module 5: Configuring Internet Explorer and Supporting Applications.

Slides:



Advertisements
Similar presentations
Auditing Microsoft Active Directory
Advertisements

®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Lesson 17: Configuring Security Policies
Configuring Windows Internet Explorer 7 Security Lesson 5.
Module 5: Creating and Configuring Group Policy
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
Chapter 9: Configuring Internet Explorer. Internet Explorer Usability Features Reorganized user interface Instant Search box RSS support Tabbed browsing.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Lesson 18: Configuring Application Restriction Policies
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 15: Internet Explorer and Remote Connectivity Tools.
Module 8: Implementing Administrative Templates and Audit Policy.
Group Policy in Microsoft Windows Active Directory.
Module 16: Software Maintenance Using Windows Server Update Services.
16.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 16: Examining Software Update.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
2851A_C01. Microsoft Windows XP Service Pack 2 Security Technologies Bruce Cowper IT Pro Advisor Microsoft Canada.
Guide to MCSE , Enhanced 1 Activity 10-1: Restarting Windows Server 2003 Objective: to restart Windows Server 2003 Start  Shut Down  Restart Configure.
Microsoft ® Official Course Module 9 Configuring Applications.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Module 1: Installing Windows XP Professional. Overview Manually Installing Windows XP Professional Automating a Windows XP Professional Installation Using.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
Module 8: Managing Client Configuration and Connectivity.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 12: Deploying and Managing Software with Group Policy.
Using Windows Firewall and Windows Defender
Securing Microsoft® Exchange Server 2010
Module 13: Maintaining Software by Using Windows Server Update Services.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
1 Chapter Overview Installing the TCP/IP Protocols Configuring TCP/IP.
Module 14: Configuring Server Security Compliance
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
C HAPTER 2 Introduction to Windows XP Professional.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Performing Software Installation with Group Policy Lesson 9.
Module 7: Managing the User Environment by Using Group Policy.
Securing Internet Access Designing an Internet Acceptable Use Policy Securing Access to the Internet by Private Network Users Restricting Access to Content.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
SMS Software Distribution. Overview  Explaining How SMS Distributes Software  Managing Distribution Points  Configuring Software Distribution and the.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.
Module 7: Implementing Security Using Group Policy.
Module 10: Implementing Administrative Templates and Audit Policy.
Module 6 Creating and Configuring Group Policy. Module Overview Overview of Group Policy Configuring the Scope of Group Policy Objects Evaluating the.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Internet Explorer 7 Updated Advice for the NHS 04 February 2008 Version 1.3.
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Introduction to Group Policy Lesson 7. Group Policy Group Policy is a method of controlling settings across your network. – Group Policy consists of user.
11 DEPLOYING AN UPDATE MANAGEMENT INFRASTRUCTURE Chapter 6.
Packaging and Deploying Windows Applications
MOAC : Configuring Windows 8.1
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Utilize Group Policy Terminal Server Settings
Introduction to Group Policy
Presentation transcript:

Module 5: Configuring Internet Explorer and Supporting Applications

Overview Configuring Security and Connection Settings for Internet Explorer Customizing and Deploying Internet Explorer Settings Supporting Applications in Windows XP Professional

Lesson: Configuring Security and Connection Settings for Internet Explorer Components of a Secure Internet Connection Security Zones for Internet Explorer Connection Settings for Internet Explorer Service Pack 2 Enhancements to Internet Explorer How to Block Pop-Ups How to Block Untrusted Publishers How to Manage Add-Ons

Components of a Secure Internet Connection Client Computers Internet Proxy Server Firewall Internet Explorer settings can support an organization’s policy on Internet and Intranet access Internet Explorer settings can augment network security infrastructure Proxy server can control access to sensitive information

Security Zones for Internet Explorer Local intranet zone: Assign a low security level to allow users to run active content Internet zone: Assign a higher security level to prevent users from running active content and downloading code Trusted sites zone. If there are specific sites that you trust, assign trust to individual URLs or entire domains Restricted sites zone. If there are specific sites on the Internet that contain potentially harmful Web content, assign the highest restrictions Local intranet zone: Assign a low security level to allow users to run active content Internet zone: Assign a higher security level to prevent users from running active content and downloading code Trusted sites zone. If there are specific sites that you trust, assign trust to individual URLs or entire domains Restricted sites zone. If there are specific sites on the Internet that contain potentially harmful Web content, assign the highest restrictions

Connection Settings for Internet Explorer Identify the connection to use when you connect to the Internet, RAS, and other services Specify the proxy server and settings for your Internet connection Identify the connection to use when you connect to the Internet, RAS, and other services Specify the proxy server and settings for your Internet connection

Service Pack 2 Enhancements to Internet Explorer Pop-up Blocker Untrusted Publisher Blocker Add-on Management Information Bar Pop-up Blocker Untrusted Publisher Blocker Add-on Management Information Bar

How to Block Pop-Ups Configure settings Turn on Pop- up Blocker

How to Block Untrusted Publishers Block publisher’s certificate Unblock selected certificates

How to Manage Add-Ons Show list of add-ons Enable or disable add-ons Update ActiveX add- on components Show list of add-ons Enable or disable add-ons Update ActiveX add- on components

Practice: Configuring Security Settings for Internet Explorer Examine default Internet Explorer security settings Configure security settings for Internet Explorer Examine default Internet Explorer security settings Configure security settings for Internet Explorer

Lesson: Customizing and Deploying Internet Explorer Settings Methods for Customizing and Deploying Internet Explorer Settings How to Customize Internet Explorer What Is the GPMC? Guidelines for Configuring Internet Explorer

Methods for Customizing and Deploying Internet Explorer Settings Internet Explorer Administration Kit Group Policy Creates custom installation packages Creates update packages Enforces Internet Explorer settings

Use Group Policy to maintain Internet Explorer settings Use Internet Explorer options to configure settings on new computers running Windows Use the IEAK to create and deploy custom browser packages on existing computers running Windows How to Customize Internet Explorer

Use the Internet Explorer Customization Wizard to configure security zones Create Flat output Use the Internet Explorer Customization Wizard to configure security zones Create Flat output Practice: Configuring Internet Explorer Settings by Using Internet Explorer Customization Wizard

What Is the GPMC? The GPMC provides: Simplified management of Group Policy A single solution for multiple Group Policy tasks

View Internet Explorer computer configuration View Internet Explorer user configuration Set security zones View Internet Explorer computer configuration View Internet Explorer user configuration Set security zones Practice: Managing Group Policy by Using the GPMC

Guidelines for Configuring Internet Explorer Restrict active content Restrict cookies Use an online virus checker Disable users’ ability to change Internet Explorer security-related settings

Lesson: Supporting Applications in Windows XP Professional What Is Add or Remove Programs Filtering? What Is Program Compatibility? How to Use Program Compatibility What Is Dr. Watson? How to Configure Dr. Watson

What Is Add or Remove Programs Filtering? Show or hide updates in the installed programs list

What Is Program Compatibility? Program Compatibility enables many programs written for earlier versions of Windows to operate on computers running Windows XP Professional

You can set Program Compatibility by: Using the Program Compatibility Wizard Manually setting compatibility properties How to Use Program Compatibility

What Is Dr. Watson? Error data is stored in a text file, Drwtsn32.log The crash dump file is a binary file that can be loaded into a debugger Dr. Watson is a Windows utility that detects information about system and application failures and records that information in a log file The Application Errors window displays all program errors

How to Configure Dr. Watson Use the Dr. Watson dialog box to configure settings Use the Dr. Watson dialog box to view the log file Open the log file manually

Practice: Configuring Dr. Watson Open the Dr. Watson dialog box View the Dr. Watson log file Open the Dr. Watson dialog box View the Dr. Watson log file

Course Evaluation