11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY2 OVERVIEW Configure Internet connections in Internet Explorer Connect to resources using Internet Explorer Configure and manage Internet Explorer security settings Configure and manage Internet Explorer privacy settings Audit and control add-on programs and browser helper objects with Add-On Manager Configure Internet connections in Internet Explorer Connect to resources using Internet Explorer Configure and manage Internet Explorer security settings Configure and manage Internet Explorer privacy settings Audit and control add-on programs and browser helper objects with Add-On Manager
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY3 MANAGING INTERNET EXPLORER CONNECTIONS Using the New Connection Wizard Dial-up Broadband Managing connection settings Local area network (LAN) Proxy Using the New Connection Wizard Dial-up Broadband Managing connection settings Local area network (LAN) Proxy
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY4 NEW CONNECTION WIZARD (DIAL-UP)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY5 NEW CONNECTION WIZARD (BROADBAND)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY6 CONFIGURING LAN AND PROXY SERVER CONNECTIONS
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY7 CONNECTING TO INTERNET RESOURCES Uniform Resource Locators (URLs) Web site resources Using FTP resources Connecting to Web folders Uniform Resource Locators (URLs) Web site resources Using FTP resources Connecting to Web folders
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY8 UNIFORM RESOURCE LOCATORS
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY9 WEB SITE RESOURCES HTML documents Active content Streaming media Web-based applications HTML documents Active content Streaming media Web-based applications
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY10 USING FTP
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY11 WEB FOLDERS
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY12 INTERNET EXPLORER SECURITY URL actions Web content zones Advanced security options URL actions Web content zones Advanced security options
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY13 URL ACTIONS (SECURITY SETTINGS)
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY14 WEB CONTENT ZONES (SECURITY ZONES) Restricted Internet Local Intranet Trusted Sites Locked-Down Local Machine Local Machine Restricted Internet Local Intranet Trusted Sites Locked-Down Local Machine Local Machine
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY15 CONFIGURING ZONE SECURITY
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY16 POLICY–BASED SECURITY MANAGEMENT
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY17 ADVANCED SECURITY SETTINGS
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY18 MANAGING PRIVACY SETTINGS IN INTERNET EXPLORER Cookies Pop-Up Blocker Internet caching Browser history AutoComplete Password caching Cookies Pop-Up Blocker Internet caching Browser history AutoComplete Password caching
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY19 TYPES OF COOKIES Persistent Session First-party Third-party Persistent Session First-party Third-party
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY20 MANAGING COOKIES
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY21 BLOCKING POP-UPS
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY22 MANAGING TEMPORARY INTERNET FILES
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY23 MANAGING BROWSER HISTORY
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY24 CLEARING BROWSER CACHE AND HISTORY
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY25 AUTOCOMPLETE
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY26 INTERNET EXPLORER PASSWORD CACHE
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY27 CONTROLLING ADD-ON PROGRAMS Add-on programs and ActiveX controls extend Internet Explorer. Browser helper objects (BHOs) control browser operation. You can manage add-ons and BHOs with Add-On Manager. Add-on programs and ActiveX controls extend Internet Explorer. Browser helper objects (BHOs) control browser operation. You can manage add-ons and BHOs with Add-On Manager.
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY28 USING ADD-ON MANAGER
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY29 SUMMARY Internet Explorer supports many Internet connection types. Proxy and LAN settings might have to be set manually. URLs help locate Internet content. Internet Explorer uses Web content zones to define security. Cookies are small files used to store preferences or personal data. Internet Explorer supports many Internet connection types. Proxy and LAN settings might have to be set manually. URLs help locate Internet content. Internet Explorer uses Web content zones to define security. Cookies are small files used to store preferences or personal data.
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY30 SUMMARY (CONTINUED) The Temporary Internet Files folder caches Web pages to speed browsing. Browser history and other data can be cleared to protect privacy. You can use Add-On Manager to control add-ons and BHOs. The Temporary Internet Files folder caches Web pages to speed browsing. Browser history and other data can be cleared to protect privacy. You can use Add-On Manager to control add-ons and BHOs.