Presentation is loading. Please wait.

Presentation is loading. Please wait.

MOAC : Configuring Windows 8.1

Similar presentations


Presentation on theme: "MOAC : Configuring Windows 8.1"— Presentation transcript:

1 MOAC 70-687: Configuring Windows 8.1
Lesson 7: Configuring Internet Explorer 11 and Internet Explorer for the Desktop MOAC : Configuring Windows 8.1

2 Overview Exam Objective 2.4: Configure Internet Explorer 11 and Internet Explorer for the desktop Configure compatibility view Configure Internet Explorer 11 settings, including add-ons, downloads, security, and privacy Lecture notes go here © 2013 John Wiley & Sons, Inc.

3 Administering Internet Explorer
Lesson 7: Configuring Internet Explorer 11 and Internet Explorer for the Desktop Lecture notes go here © 2013 John Wiley & Sons, Inc.

4 Internet Explorer Windows 8.1 includes Internet Explorer Version 11.
Internet Explorer 11 has two distinct interfaces. When you launch Internet Explorer 11 from the desktop, you see the same familiar screen arrangement as in previous versions, with a menu bar and tabs across the top. When you launch Internet Explorer 11 by clicking the tile on the Start screen, you initially see a screen with a dark-colored address bar along the bottom, but that soon disappears, leaving the entire screen filled with the web page content. © 2013 John Wiley & Sons, Inc.

5 Administering Internet Explorer
The IE Start screen interface © 2013 John Wiley & Sons, Inc.

6 Administering Internet Explorer
The Internet Explorer Settings panel © 2013 John Wiley & Sons, Inc.

7 Configuring Internet Explorer
As with earlier versions of Internet Explorer, the browser satisfies most users’ needs with no adjustment. However, some of the new features in Internet Explorer 11 require configuration. © 2013 John Wiley & Sons, Inc.

8 Configuring Compatibility View
To accommodate older pages, Internet Explorer 11 includes a feature called Compatibility View, which enables the browser to display older pages properly. When you select Tools, Compatibility View Settings from the Tools menu, the Compatibility View Settings dialog box appears. In this dialog box, you can maintain a list of web sites for which you want to use Compatibility View all of the time. For workstations on an Active Directory Domain Services (AD DS) network, administrators can configure Compatibility View settings using Group Policy. © 2013 John Wiley & Sons, Inc.

9 Configuring Compatibility View
The IE Compatibility View icon © 2013 John Wiley & Sons, Inc.

10 Configuring Compatibility View
The IE Compatibility View Settings dialog box © 2013 John Wiley & Sons, Inc.

11 Policy Settings for Compatibility View
Policy settings for Compatibility View are: Turn on Internet Explorer 7 Standards Mode Turn off Compatibility View Turn on Internet Explorer Standards Mode for Local Intranet Turn off Compatibility View button Include updated website lists from Microsoft Use Policy list of Internet Explorer 7 sites Use policy list of quirks mode sites • Turn on Internet Explorer 7 Standards Mode – Causes IE to render all web pages in the Standards Mode from the previous version of the browser. This improves compatibility with older web sites, but can negatively affect the appearance of sites designed to the current standard. • Turn off Compatibility View – Disables the Compatibility View feature in IE. The broken view icon does not appear, and users cannot configure the Compatibility View settings. • Turn on Internet Explorer Standards Mode for Local Intranet – Causes IE to display all intranet content using the current Standards Mode, and prevents users from modifying this behavior. • Turn off Compatibility View button – Prevents the broken page icon from appearing on the IE address box. • Include updated website lists from Microsoft – Forces IE to use the Microsoft site compatibility lists when displaying web pages. • Use Policy list of Internet Explorer 7 sites – Enables administrators to create a common list of sites that IE should display using Compatibility View mode. • Use policy list of quirks mode sites – Enables Internet Explorer to identify itself to servers with an IE7 user agent string and operate in quirks mode, which supports incomplete standards, as opposed to standard mode. © 2013 John Wiley & Sons, Inc.

12 Managing Add-ons To work with the Internet Explorer 11 add-ons on a particular Windows 8.1 computer, you open the Manage Add-ons dialog box by clicking Tools\Manage Add-ons from either the menu bar or the Tools toolbar button. The add-on types supported by Internet Explorer 11are: Toolbars and Extensions Search Providers Accelerators Tracking Protection © 2013 John Wiley & Sons, Inc.

13 The Manage Add-ons dialog box
Managing Add-ons • Toolbars and Extensions – Enable the browser to open and manipulate web sites or file types that IE does not support natively. Some applications add their own toolbars to IE, enabling you to work with their documents within an IE session. • Search Providers – Enable the user to perform searches directly from the IE interface using search engines on the Internet or the local network • Accelerators – Enable users to send text or other media they select in an IE browser window to another application, such as an client, or an Internet resource, such as a blog • Tracking Protection – Enables users to install or maintain a list of sites that the IE should prevent from sharing your browsing habits with other sites. The Manage Add-ons dialog box © 2013 John Wiley & Sons, Inc.

14 Configuring Search Options
By default, the Instant Search box found in Internet Explorer enables users to perform searches using Microsoft’s Bing engine. To use other search engines, you must first install them to the list of search providers. Search providers are add-ons specifically designed to conform to the syntax required by other search engines. © 2013 John Wiley & Sons, Inc.

15 The Add-ons page of the Internet Explorer Gallery
Add a Search Provider The Add-ons page of the Internet Explorer Gallery © 2013 John Wiley & Sons, Inc.

16 The Add Search Provider dialog box
Add a Search Provider The Add Search Provider dialog box © 2013 John Wiley & Sons, Inc.

17 Specify a Default Search Provider
The Search Providers list in the Manage Add-ons dialog box © 2013 John Wiley & Sons, Inc.

18 Configuring Accelerators
By default, Internet Explorer 11 includes accelerators that enable users to content, find it on a map, or translate it to another language. By clicking the Find more accelerators link on the Manage Add-ons dialog box, you can install new accelerators from the Microsoft Add-ons Gallery, using them to replace or augment the default ones. © 2013 John Wiley & Sons, Inc.

19 Configuring Accelerators Using Group Policy
Administrators can control the use of accelerators on Windows 8.1 computers using Group Policy. The Accelerators Group Policy settings are as follows: Add non-default Accelerators Add default Accelerators Turn off Accelerators Restrict Accelerators to those deployed through Group Policy • Add non-default Accelerators – Enables administrators to specify additional accelerators to be installed on Windows 8 computers. Users can also add their own non-default accelerators at will, but they cannot modify or remove the accelerators specified by the administrator. • Add default Accelerators – Causes Windows 8 computers to deploy the accelerators included with IE by default. Default. Users can also add their own accelerators at will, but they cannot modify or remove the default accelerators. • Turn off Accelerators – Prevents Windows 8 computers from running any IE accelerators • Restrict Accelerators to those deployed through Group Policy – Prevents Windows 8 users from adding any accelerators other than those specified by the administrator in other Group Policy settings. © 2013 John Wiley & Sons, Inc.

20 Configuring Download Manager
When you download a file from a web site in IE 11, the browser’s built-in download manager takes over, prompting you confirm the download with a dialog box. From this dialog box, you can do any of the following: Download and run the selected file. Download and save the selected file to the program’s default folder. Download and save the selected file to another folder. Cancel the download. © 2013 John Wiley & Sons, Inc.

21 Configuring Download Manager
Internet Explorer download options © 2013 John Wiley & Sons, Inc.

22 Configuring Download Manager
Internet Explorer downloaded file options © 2013 John Wiley & Sons, Inc.

23 Configuring Download Manager
The Internet Explorer View Downloads window © 2013 John Wiley & Sons, Inc.

24 Securing Internet Explorer
The web browser is the primary application that most people use to access the Internet, and as a result it is also a major point of weakness from a security perspective. The security improvements included in the Windows 8/8.1 release of Internet Explorer provide users with the highest degree of protection possible without compromising their Internet experiences. © 2013 John Wiley & Sons, Inc.

25 Understanding Protected Mode
Protected mode is an operational state designed to prevent attackers that do penetrate the computer’s defenses from accessing vital system components. Protected mode is essentially a way to run Internet Explorer with highly reduced privileges. Windows 8.1 includes a security feature called Mandatory Integrity Control (MIC), which assigns various integrity access levels to processes running on the computer. © 2013 John Wiley & Sons, Inc.

26 Mandatory Integrity Control
Integrity Access Level Privilege Level Privileges High Administrator The process is granted full access to the system, including write access to the Program Files folder and the HKEY_LOCAL_MACHINE registry key. Medium User The process is granted limited access to the system, including write access to user-specific areas, such as the user’s Documents folder and the HKEY_CURRENT_USER registry key. All processes that are not explicitly assigned an integrity access level receive this level of access. Low Untrusted The process is granted minimal access to the system, including write access only to the Temporary Internet Files\Low folder and the HKEY_CURRENT_USER\Software\Microsoft\Intern et Explorer/LowRegistry registry key © 2013 John Wiley & Sons, Inc.

27 Detecting Protected Mode Incompatibilities
Because IE on Windows 8.1 runs in protected mode by default, it is possible that web-based applications designed to run on earlier versions might not run properly. However, you might find that applications that did not run under IE version 7 now do run in IE 11, using the default settings. Once you have determined the exact source of your application’s incompatibility, you can use the following techniques to try to resolve the problem. Move the site to the Trusted Sites zone Disable protected mode in IE Modify the application © 2013 John Wiley & Sons, Inc.

28 Detecting Protected Mode Incompatibilities
Protected mode disabled © 2013 John Wiley & Sons, Inc.

29 Enhanced Protected Mode
Enhanced Protected Mode is an extension of protected mode. Enhanced Protected Mode blocks unauthorized access to addition system resources, such as personal information and corporate network resources. © 2013 John Wiley & Sons, Inc.

30 Enhanced Protected Mode
Enabling Enhanced Protected Mode © 2013 John Wiley & Sons, Inc.

31 Configuring Security Zones
To provide different levels of access to specific applications, Internet Explorer uses security zones, each of which has a different set of privileges. The four zones are: Restricted Sites Internet Local Intranet Trusted Sites • Internet – All web sites that are not listed in the other three zones fall into this zone. Sites in the Internet zone run in protected mode and have minimal access to the computer’s drives and configuration settings. • Local Intranet – IE automatically detects sites that originate from the local intranet and places them in this zone. Sites in this zone do not run in protected mode and have significant access to the system, including the ability to run certain scripts, ActiveX controls, and plug-ins. • Trusted Sites – This zone provides the most elevated set of privileges and is intended for sites that you can trust not to damage the computer. By default, there are no sites in this zone; you must add them manually. • Restricted Sites – This zone has the most reduced set of privileges and runs in protected mode. It is intended for web sites that are known to be malicious, but which users still must access for some reason. As with the Trusted Sites zone, this zone is empty by default. © 2013 John Wiley & Sons, Inc.

32 Add a Site to a Security Zone
The Security tab of the Internet Options dialog box © 2013 John Wiley & Sons, Inc.

33 Modify Security Zone Settings
The Security Settings dialog box for the Internet zone © 2013 John Wiley & Sons, Inc.

34 SmartScreen Filter Internet Explorer 11 includes a component called the SmartScreen Filter that examines traffic for evidence of phishing activity and displays a warning to the user if it finds any. The IE SmartScreen Filter uses three techniques to identify potential phishing web sites: Online lookup of phishing sites Online lookup of download sites Onsite analysis You can disable it by clicking the Tools icon and selecting Safety > Turn off SmartScreen Filter. © 2013 John Wiley & Sons, Inc.

35 Using InPrivate Mode InPrivate Mode enables you to surf the Internet without leaving any record of your activities. To use InPrivate Browsing, you click the Safety button on the toolbar and select InPrivate Browsing. A new Internet Explorer 10 window appears. © 2013 John Wiley & Sons, Inc.

36 Using InPrivate Browsing
InPrivate Browsing in Internet Explorer © 2013 John Wiley & Sons, Inc.

37 Using InPrivate Mode InPrivate Filtering enables you to block specific providers – or all providers – from gathering that information. You can open a browser window that uses InPrivate Filtering by clicking the Tools button in the toolbar and selecting InPrivate Filtering. © 2013 John Wiley & Sons, Inc.

38 Using InPrivate Mode AD DS administrators can configure InPrivate Mode settings for Windows 8.1 users all over the network using Group Policy. The policy settings for InPrivate Mode are: Establish InPrivate Filtering threshold Establish Tracking Protection threshold Prevent the computer from loading toolbars and Browser Helper Objects when InPrivate Browsing starts Turn off collection of InPrivate Filtering data Turn off InPrivate Browsing Turn off InPrivate Filtering Turn off tracking protection © 2013 John Wiley & Sons, Inc.

39 Browsing with Certificates
Secure Sockets Layer (SSL) is the protocol that most web sites use when establishing secure connections with clients over the Internet. SSL communications are based on a public key infrastructure (PKI), which requires two encryptions keys, a public one and a private one. A web server participating in a PKI receives a digital certificate from a certification authority (CA), which contains its public key. The server also generates a private key, which it stores locally. When a Windows 8.1 IE user connects to a site that is secured using SSL, a lock appears in the address bar, along with the name of the organization to which the CA issued the certificate. © 2013 John Wiley & Sons, Inc.

40 Browsing with Certificates
A secure connection in IE 11 © 2013 John Wiley & Sons, Inc.

41 Browsing with Certificates
The Certificate dialog box © 2013 John Wiley & Sons, Inc.

42 Lesson Summary Many of the pages on the Internet still conform to old standards, and Internet Explorer 11 might not display them properly. To accommodate these pages, Internet Explorer 11 includes a feature called Compatibility View, which enables the browser to display older pages properly. One of the ways that IE interacts with other resources is through the use of add-ons. Add-ons are separate software components, created by Microsoft or by third parties, that interact with the basic functions of the web browser. Accelerators enable users to send content to other resources, in the form of applications running on the computer or other sites on the Internet. Accelerators enable you to highlight content in a browser window and select the accelerator for the resource you want to receive that content. © 2013 John Wiley & Sons, Inc.

43 Lesson Summary Many Websites that provide frequently changing content, such as news sites and blogs, support a push technology called RSS, which simplifies the process of delivering updated content to designated users. Protected mode is a way to run Internet Explorer with highly reduced privileges. Enhanced protected mode provides more protection, at the cost of compatibility with some add-ons. Phishing is a technique that uses convincing-looking Websites that urge users to supply personal information, such as passwords and account numbers. Internet Explorer 8.1 includes a SmartScreen Filter that examines traffic for evidence of phishing activity and displays a warning to the user if it finds any. © 2013 John Wiley & Sons, Inc.

44 Copyright 2013 John Wiley & Sons, Inc..
All rights reserved. Reproduction or translation of this work beyond that named in Section 117 of the 1976 United States Copyright Act without the express written consent of the copyright owner is unlawful. Requests for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc.. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.


Download ppt "MOAC : Configuring Windows 8.1"

Similar presentations


Ads by Google