Presentation is loading. Please wait.

Presentation is loading. Please wait.

11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.

Similar presentations


Presentation on theme: "11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12."— Presentation transcript:

1 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12

2 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY2 OVERVIEW  Configure Internet connections in Internet Explorer  Connect to resources using Internet Explorer  Configure and manage Internet Explorer security settings  Configure and manage Internet Explorer privacy settings  Audit and control add-on programs and browser helper objects with Add-On Manager  Configure Internet connections in Internet Explorer  Connect to resources using Internet Explorer  Configure and manage Internet Explorer security settings  Configure and manage Internet Explorer privacy settings  Audit and control add-on programs and browser helper objects with Add-On Manager

3 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY3 MANAGING INTERNET EXPLORER CONNECTIONS  Using the New Connection Wizard  Dial-up  Broadband  Managing connection settings  Local area network (LAN)  Proxy  Using the New Connection Wizard  Dial-up  Broadband  Managing connection settings  Local area network (LAN)  Proxy

4 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY4 NEW CONNECTION WIZARD (DIAL-UP)

5 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY5 NEW CONNECTION WIZARD (BROADBAND)

6 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY6 CONFIGURING LAN AND PROXY SERVER CONNECTIONS

7 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY7 CONNECTING TO INTERNET RESOURCES  Uniform Resource Locators (URLs)  Web site resources  Using FTP resources  Connecting to Web folders  Uniform Resource Locators (URLs)  Web site resources  Using FTP resources  Connecting to Web folders

8 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY8 UNIFORM RESOURCE LOCATORS

9 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY9 WEB SITE RESOURCES  HTML documents  Active content  Streaming media  Web-based applications  HTML documents  Active content  Streaming media  Web-based applications

10 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY10 USING FTP

11 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY11 WEB FOLDERS

12 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY12 INTERNET EXPLORER SECURITY  URL actions  Web content zones  Advanced security options  URL actions  Web content zones  Advanced security options

13 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY13 URL ACTIONS (SECURITY SETTINGS)

14 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY14 WEB CONTENT ZONES (SECURITY ZONES)  Restricted  Internet  Local Intranet  Trusted Sites  Locked-Down Local Machine  Local Machine  Restricted  Internet  Local Intranet  Trusted Sites  Locked-Down Local Machine  Local Machine

15 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY15 CONFIGURING ZONE SECURITY

16 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY16 POLICY–BASED SECURITY MANAGEMENT

17 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY17 ADVANCED SECURITY SETTINGS

18 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY18 MANAGING PRIVACY SETTINGS IN INTERNET EXPLORER  Cookies  Pop-Up Blocker  Internet caching  Browser history  AutoComplete  Password caching  Cookies  Pop-Up Blocker  Internet caching  Browser history  AutoComplete  Password caching

19 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY19 TYPES OF COOKIES  Persistent  Session  First-party  Third-party  Persistent  Session  First-party  Third-party

20 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY20 MANAGING COOKIES

21 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY21 BLOCKING POP-UPS

22 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY22 MANAGING TEMPORARY INTERNET FILES

23 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY23 MANAGING BROWSER HISTORY

24 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY24 CLEARING BROWSER CACHE AND HISTORY

25 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY25 AUTOCOMPLETE

26 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY26 INTERNET EXPLORER PASSWORD CACHE

27 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY27 CONTROLLING ADD-ON PROGRAMS  Add-on programs and ActiveX controls extend Internet Explorer.  Browser helper objects (BHOs) control browser operation.  You can manage add-ons and BHOs with Add-On Manager.  Add-on programs and ActiveX controls extend Internet Explorer.  Browser helper objects (BHOs) control browser operation.  You can manage add-ons and BHOs with Add-On Manager.

28 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY28 USING ADD-ON MANAGER

29 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY29 SUMMARY  Internet Explorer supports many Internet connection types.  Proxy and LAN settings might have to be set manually.  URLs help locate Internet content.  Internet Explorer uses Web content zones to define security.  Cookies are small files used to store preferences or personal data.  Internet Explorer supports many Internet connection types.  Proxy and LAN settings might have to be set manually.  URLs help locate Internet content.  Internet Explorer uses Web content zones to define security.  Cookies are small files used to store preferences or personal data.

30 Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY30 SUMMARY (CONTINUED)  The Temporary Internet Files folder caches Web pages to speed browsing.  Browser history and other data can be cleared to protect privacy.  You can use Add-On Manager to control add-ons and BHOs.  The Temporary Internet Files folder caches Web pages to speed browsing.  Browser history and other data can be cleared to protect privacy.  You can use Add-On Manager to control add-ons and BHOs.


Download ppt "11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12."

Similar presentations


Ads by Google