Presentation is loading. Please wait.

Presentation is loading. Please wait.

Module 5: Configuring Internet Explorer and Supporting Applications.

Similar presentations


Presentation on theme: "Module 5: Configuring Internet Explorer and Supporting Applications."— Presentation transcript:

1 Module 5: Configuring Internet Explorer and Supporting Applications

2 Overview Configuring Security and Connection Settings for Internet Explorer Customizing and Deploying Internet Explorer Settings Supporting Applications in Windows XP Professional

3 Lesson: Configuring Security and Connection Settings for Internet Explorer Components of a Secure Internet Connection Security Zones for Internet Explorer Connection Settings for Internet Explorer Service Pack 2 Enhancements to Internet Explorer How to Block Pop-Ups How to Block Untrusted Publishers How to Manage Add-Ons

4 Components of a Secure Internet Connection Client Computers Internet Proxy Server Firewall Internet Explorer settings can support an organization’s policy on Internet and Intranet access Internet Explorer settings can augment network security infrastructure Proxy server can control access to sensitive information

5 Security Zones for Internet Explorer Local intranet zone: Assign a low security level to allow users to run active content Internet zone: Assign a higher security level to prevent users from running active content and downloading code Trusted sites zone. If there are specific sites that you trust, assign trust to individual URLs or entire domains Restricted sites zone. If there are specific sites on the Internet that contain potentially harmful Web content, assign the highest restrictions Local intranet zone: Assign a low security level to allow users to run active content Internet zone: Assign a higher security level to prevent users from running active content and downloading code Trusted sites zone. If there are specific sites that you trust, assign trust to individual URLs or entire domains Restricted sites zone. If there are specific sites on the Internet that contain potentially harmful Web content, assign the highest restrictions

6 Connection Settings for Internet Explorer Identify the connection to use when you connect to the Internet, RAS, and other services Specify the proxy server and settings for your Internet connection Identify the connection to use when you connect to the Internet, RAS, and other services Specify the proxy server and settings for your Internet connection

7 Service Pack 2 Enhancements to Internet Explorer Pop-up Blocker Untrusted Publisher Blocker Add-on Management Information Bar Pop-up Blocker Untrusted Publisher Blocker Add-on Management Information Bar

8 How to Block Pop-Ups Configure settings Turn on Pop- up Blocker

9 How to Block Untrusted Publishers Block publisher’s certificate Unblock selected certificates

10 How to Manage Add-Ons Show list of add-ons Enable or disable add-ons Update ActiveX add- on components Show list of add-ons Enable or disable add-ons Update ActiveX add- on components

11 Practice: Configuring Security Settings for Internet Explorer Examine default Internet Explorer security settings Configure security settings for Internet Explorer Examine default Internet Explorer security settings Configure security settings for Internet Explorer 1 1 2 2

12 Lesson: Customizing and Deploying Internet Explorer Settings Methods for Customizing and Deploying Internet Explorer Settings How to Customize Internet Explorer What Is the GPMC? Guidelines for Configuring Internet Explorer

13 Methods for Customizing and Deploying Internet Explorer Settings Internet Explorer Administration Kit Group Policy Creates custom installation packages Creates update packages Enforces Internet Explorer settings

14 Use Group Policy to maintain Internet Explorer settings Use Internet Explorer options to configure settings on new computers running Windows Use the IEAK to create and deploy custom browser packages on existing computers running Windows How to Customize Internet Explorer

15 Use the Internet Explorer Customization Wizard to configure security zones Create Flat output Use the Internet Explorer Customization Wizard to configure security zones Create Flat output 1 1 2 2 Practice: Configuring Internet Explorer Settings by Using Internet Explorer Customization Wizard

16 What Is the GPMC? The GPMC provides: Simplified management of Group Policy A single solution for multiple Group Policy tasks

17 View Internet Explorer computer configuration View Internet Explorer user configuration Set security zones View Internet Explorer computer configuration View Internet Explorer user configuration Set security zones 1 1 2 2 3 3 Practice: Managing Group Policy by Using the GPMC

18 Guidelines for Configuring Internet Explorer Restrict active content Restrict cookies Use an online virus checker Disable users’ ability to change Internet Explorer security-related settings

19 Lesson: Supporting Applications in Windows XP Professional What Is Add or Remove Programs Filtering? What Is Program Compatibility? How to Use Program Compatibility What Is Dr. Watson? How to Configure Dr. Watson

20 What Is Add or Remove Programs Filtering? Show or hide updates in the installed programs list

21 What Is Program Compatibility? Program Compatibility enables many programs written for earlier versions of Windows to operate on computers running Windows XP Professional

22 You can set Program Compatibility by: Using the Program Compatibility Wizard Manually setting compatibility properties How to Use Program Compatibility

23 What Is Dr. Watson? Error data is stored in a text file, Drwtsn32.log The crash dump file is a binary file that can be loaded into a debugger Dr. Watson is a Windows utility that detects information about system and application failures and records that information in a log file The Application Errors window displays all program errors

24 How to Configure Dr. Watson Use the Dr. Watson dialog box to configure settings Use the Dr. Watson dialog box to view the log file Open the log file manually

25 Practice: Configuring Dr. Watson Open the Dr. Watson dialog box View the Dr. Watson log file Open the Dr. Watson dialog box View the Dr. Watson log file 1 1 2 2

26 Course Evaluation


Download ppt "Module 5: Configuring Internet Explorer and Supporting Applications."

Similar presentations


Ads by Google