Download presentation
Presentation is loading. Please wait.
Published bySimon Stafford Modified over 9 years ago
1
11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12
2
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY2 OVERVIEW Configure Internet connections in Internet Explorer Connect to resources using Internet Explorer Configure and manage Internet Explorer security settings Configure and manage Internet Explorer privacy settings Audit and control add-on programs and browser helper objects with Add-On Manager Configure Internet connections in Internet Explorer Connect to resources using Internet Explorer Configure and manage Internet Explorer security settings Configure and manage Internet Explorer privacy settings Audit and control add-on programs and browser helper objects with Add-On Manager
3
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY3 MANAGING INTERNET EXPLORER CONNECTIONS Using the New Connection Wizard Dial-up Broadband Managing connection settings Local area network (LAN) Proxy Using the New Connection Wizard Dial-up Broadband Managing connection settings Local area network (LAN) Proxy
4
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY4 NEW CONNECTION WIZARD (DIAL-UP)
5
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY5 NEW CONNECTION WIZARD (BROADBAND)
6
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY6 CONFIGURING LAN AND PROXY SERVER CONNECTIONS
7
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY7 CONNECTING TO INTERNET RESOURCES Uniform Resource Locators (URLs) Web site resources Using FTP resources Connecting to Web folders Uniform Resource Locators (URLs) Web site resources Using FTP resources Connecting to Web folders
8
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY8 UNIFORM RESOURCE LOCATORS
9
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY9 WEB SITE RESOURCES HTML documents Active content Streaming media Web-based applications HTML documents Active content Streaming media Web-based applications
10
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY10 USING FTP
11
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY11 WEB FOLDERS
12
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY12 INTERNET EXPLORER SECURITY URL actions Web content zones Advanced security options URL actions Web content zones Advanced security options
13
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY13 URL ACTIONS (SECURITY SETTINGS)
14
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY14 WEB CONTENT ZONES (SECURITY ZONES) Restricted Internet Local Intranet Trusted Sites Locked-Down Local Machine Local Machine Restricted Internet Local Intranet Trusted Sites Locked-Down Local Machine Local Machine
15
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY15 CONFIGURING ZONE SECURITY
16
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY16 POLICY–BASED SECURITY MANAGEMENT
17
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY17 ADVANCED SECURITY SETTINGS
18
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY18 MANAGING PRIVACY SETTINGS IN INTERNET EXPLORER Cookies Pop-Up Blocker Internet caching Browser history AutoComplete Password caching Cookies Pop-Up Blocker Internet caching Browser history AutoComplete Password caching
19
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY19 TYPES OF COOKIES Persistent Session First-party Third-party Persistent Session First-party Third-party
20
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY20 MANAGING COOKIES
21
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY21 BLOCKING POP-UPS
22
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY22 MANAGING TEMPORARY INTERNET FILES
23
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY23 MANAGING BROWSER HISTORY
24
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY24 CLEARING BROWSER CACHE AND HISTORY
25
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY25 AUTOCOMPLETE
26
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY26 INTERNET EXPLORER PASSWORD CACHE
27
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY27 CONTROLLING ADD-ON PROGRAMS Add-on programs and ActiveX controls extend Internet Explorer. Browser helper objects (BHOs) control browser operation. You can manage add-ons and BHOs with Add-On Manager. Add-on programs and ActiveX controls extend Internet Explorer. Browser helper objects (BHOs) control browser operation. You can manage add-ons and BHOs with Add-On Manager.
28
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY28 USING ADD-ON MANAGER
29
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY29 SUMMARY Internet Explorer supports many Internet connection types. Proxy and LAN settings might have to be set manually. URLs help locate Internet content. Internet Explorer uses Web content zones to define security. Cookies are small files used to store preferences or personal data. Internet Explorer supports many Internet connection types. Proxy and LAN settings might have to be set manually. URLs help locate Internet content. Internet Explorer uses Web content zones to define security. Cookies are small files used to store preferences or personal data.
30
Chapter 12: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY30 SUMMARY (CONTINUED) The Temporary Internet Files folder caches Web pages to speed browsing. Browser history and other data can be cleared to protect privacy. You can use Add-On Manager to control add-ons and BHOs. The Temporary Internet Files folder caches Web pages to speed browsing. Browser history and other data can be cleared to protect privacy. You can use Add-On Manager to control add-ons and BHOs.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.