Chapter 9: Configuring Internet Explorer

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Advertisements

® Microsoft Office 2010 Browser and Basics.
Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
Web Filtering. ExchangeDefender Web Filtering provides policy-controlled protection from dangerous content on the web. Web Filtering is agent based, allowing.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 4: Web Browsing.
Configuring Windows Internet Explorer 7 Security Lesson 5.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Lesson 4: Web Browsing.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
Chapter 9: Configuring Internet Explorer. Internet Explorer Usability Features Reorganized user interface Instant Search box RSS support Tabbed browsing.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
The New Internet Explorer 7 By Ronald Pastor. Overview  Makes everyday web surfing easier –Internet Explorer 7 provides improved navigation through tabbed.
Module 6 Windows 2000 Professional 6.1 Installation 6.2 Administration/User Interface 6.3 User Accounts 6.4 Managing the File System 6.5 Services.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
1 of 7 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
11 CONFIGURE INTERNET EXPLORER Chapter 5. Chapter 5: Configure Internet Explorer2 CHAPTER OVERVIEW AND OBJECTIVES  Configuring Accessibility and Language.
Sharepoint Portal Server Basics. Introduction Sharepoint server belongs to Microsoft family of servers Integrated suite of server capabilities Hosted.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Microsoft ® Official Course Module 9 Configuring Applications.
PowerPoint Presentation to Accompany GO! with Internet Explorer 9 Getting Started Chapter 3 Exploring the World Wide Web with Internet Explorer 9.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Windows Internet Explorer 7 – Illustrated Essentials Unit B - Getting the Most from Internet Explorer 7.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
Configuring and Troubleshooting Internet Access Chapter 9 powered by dj.
Configuring Windows Vista Applications Lesson 9. Skills Matrix Technology SkillObjective DomainObjective # Configuring Internet Explorer 7 Configure Windows.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 9 User Productivity Tools.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
CIM6400 CTNW (04/05) 1 CIM6400 CTNW Lesson 6 – More on Windows 2000.
Copyright 2000 eMation SECURITY - Controlling Data Access with
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
COMPREHENSIVE Windows Tutorial 4 Working with the Internet and .
Internet Explorer 7. Cut through the clutter. Redesigned streamlined interface –Maximizes the area of the screen that displays the webpage.
Chapter 3 (HW02) Exploring the World Wide Web with Internet Explorer 9.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Microsoft FrontPage 2003 Illustrated Complete Finalizing a Web Site.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Module 5: Configuring Internet Explorer and Supporting Applications.
XP Browser and Basics COM111 Introduction to Computer Applications.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 9 User Productivity Tools.
Copyright © 2008 Pearson Prentice Hall. All rights reserved. 1 1 Committed to Shaping the Next Generation of IT Experts. The Online Experience Robert Grauer,
Windows Administration How to protect your computer.
Internet Explorer 7 Updated Advice for the NHS 04 February 2008 Version 1.3.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Windows Tutorial 5 Protecting Your Computer
Accessing the Intranet
Managing Windows Security
Lesson 4: Web Browsing.
Unit 11 Using the Internet & Browsing the Web
Browser Settings *Failure to have the correct Browser cache setting may result in incorrect data being displayed. This is the procedure to allow Indistar.
MICROSOFT OUTLOOK and Outlook service Provider
MOAC : Configuring Windows 8.1
Microsoft FrontPage 2003 Illustrated Complete
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
IIS.
Welcome! IE 7 Test Drive Presented by the Office of Information Technology.
Lesson #7 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 7 Configuring Devices and Updates.
Internet Explorer 6 Workshop
Lesson 4: Web Browsing.
EXPLORING THE INTERNET
Internet Explorer 6 Workshop
Dongwhan Kim Annie Zhao Steven Lawrance
Windows Vista Inside Out
Internet explorer.
Presentation transcript:

Chapter 9: Configuring Internet Explorer

Internet Explorer A web browser used to search and view information on the internet or an intranet HTTP The main protocol for making web requests Hypertext Transport Protocol is used to transfer requests and information between servers and browsers. FTP Mainly used to transfer files between computers on the internet File Transfer Protocol Can either be anonymous or with a username and password Permissions are set at the server

Internet Explorer Usability Features Reorganized user interface To reduce clutter and maximize web page viewing area Instant Search box RSS support Tabbed browsing Pop-up blocker Add-on support Favorites center

Instant Search Quickly search selected search provider Change default search provider Create custom search provider

Configuring RSS Really Simple Syndication XML-based technology Subscribe to feeds Such as Microsoft TechNet Feed options Under Favorites Star Automatically download attachments Automatically update feeds How Often How Many

Configuring Add-ons Add-ons extend functionality of browser Improve usability, security, or provide entertainment. Created by third-parties May cause instability Enable or disable add-ons Tools toolbar, then Manage Add-ons Internet Explorer (No Add-ons) To run IE without installed add-ons running: Start>All Programs>Accessories>System Tools> Internet Explorer (No Add-Ons)

Pop-up Blocker Prevents pop-ups from being displayed On by default, but not all pop-ups are bad Selectively enable pop-ups Information Bar Pop-up Blocker Settings dialog box Exceptions in Tools, Pop-up blocker, Pop-up blocker settings

Internet Explorer Security Features Phishing Filter Improved privacy features Security Status Bar Parental controls Protected Mode

Phishing Filter Prevents malicious websites from masquerading as legitimate websites, such as PayPal, in order to get personal information An email sent by someone masquerading as legitimate site, will ask for your credentials or financial information and link you to their site for collection. Automatic website checking Polls Microsoft against a list of known fraudulent websites Report websites believed to be malicious

Parental Controls Monitor and restrict computer usage Internet usage application usage enforce time-limits Configured only on standard user accounts, by administrators Allow list Allows only the websites listed

Protected Mode Isolated environment Prevents code from being run on system files, unless the user explicitly allows the access Configured on Security tab of Internet Properties dialog box

Internet Privacy Delete Browsing History Temporary Internet Files Cookies History Form data Passwords