11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.
-
Upload
simon-stafford -
Category
Documents
-
view
220 -
download
1
Transcript of 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.
![Page 1: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/1.jpg)
11
MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY
Chapter 12
![Page 2: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/2.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 2
OVERVIEW
Configure Internet connections in Internet Explorer
Connect to resources using Internet Explorer
Configure and manage Internet Explorer security settings
Configure and manage Internet Explorer privacy settings
Audit and control add-on programs and browser helper objects with Add-On Manager
![Page 3: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/3.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 3
MANAGING INTERNET EXPLORER CONNECTIONS
Using the New Connection Wizard Dial-up
Broadband
Managing connection settings Local area network (LAN)
Proxy
![Page 4: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/4.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 4
NEW CONNECTION WIZARD (DIAL-UP)
![Page 5: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/5.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 5
NEW CONNECTION WIZARD (BROADBAND)
![Page 6: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/6.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 6
CONFIGURING LAN AND PROXY SERVER CONNECTIONS
![Page 7: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/7.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 7
CONNECTING TO INTERNET RESOURCES
Uniform Resource Locators (URLs)
Web site resources
Using FTP resources
Connecting to Web folders
![Page 8: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/8.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 8
UNIFORM RESOURCE LOCATORS
![Page 9: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/9.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 9
WEB SITE RESOURCES
HTML documents
Active content
Streaming media
Web-based applications
![Page 10: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/10.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 10
USING FTP
![Page 11: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/11.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 11
WEB FOLDERS
![Page 12: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/12.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 12
INTERNET EXPLORER SECURITY
URL actions
Web content zones
Advanced security options
![Page 13: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/13.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 13
URL ACTIONS (SECURITY SETTINGS)
![Page 14: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/14.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 14
WEB CONTENT ZONES (SECURITY ZONES)
Restricted
Internet
Local Intranet
Trusted Sites
Locked-Down Local Machine
Local Machine
![Page 15: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/15.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 15
CONFIGURING ZONE SECURITY
![Page 16: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/16.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 16
POLICY–BASED SECURITY MANAGEMENT
![Page 17: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/17.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 17
ADVANCED SECURITY SETTINGS
![Page 18: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/18.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 18
MANAGING PRIVACY SETTINGS IN INTERNET EXPLORER
Cookies
Pop-Up Blocker
Internet caching
Browser history
AutoComplete
Password caching
![Page 19: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/19.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 19
TYPES OF COOKIES
Persistent
Session
First-party
Third-party
![Page 20: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/20.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 20
MANAGING COOKIES
![Page 21: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/21.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 21
BLOCKING POP-UPS
![Page 22: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/22.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 22
MANAGING TEMPORARY INTERNET FILES
![Page 23: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/23.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 23
MANAGING BROWSER HISTORY
![Page 24: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/24.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 24
CLEARING BROWSER CACHE AND HISTORY
![Page 25: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/25.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 25
AUTOCOMPLETE
![Page 26: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/26.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 26
INTERNET EXPLORER PASSWORD CACHE
![Page 27: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/27.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 27
CONTROLLING ADD-ON PROGRAMS
Add-on programs and ActiveX controls extend Internet Explorer.
Browser helper objects (BHOs) control browser operation.
You can manage add-ons and BHOs with Add-On Manager.
![Page 28: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/28.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 28
USING ADD-ON MANAGER
![Page 29: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/29.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 29
SUMMARY
Internet Explorer supports many Internet connection types.
Proxy and LAN settings might have to be set manually.
URLs help locate Internet content.
Internet Explorer uses Web content zones to define security.
Cookies are small files used to store preferences or personal data.
![Page 30: 11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.](https://reader035.fdocuments.net/reader035/viewer/2022062409/5697bfb51a28abf838c9d7c0/html5/thumbnails/30.jpg)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 30
SUMMARY (CONTINUED)
The Temporary Internet Files folder caches Web pages to speed browsing.
Browser history and other data can be cleared to protect privacy.
You can use Add-On Manager to control add-ons and BHOs.