Lesson 7: Configuring Internet Explorer 11 and Internet

Lesson 7: Configuring Internet
Explorer 11 and Internet
Explorer for the Desktop
MOAC 70-687: Configuring Windows 8.1
Overview
• Exam Objective 2.4: Configure Internet
Explorer 11 and Internet Explorer for the
desktop
o Configure compatibility view
o Configure Internet Explorer 11 settings, including
add-ons, downloads, security, and privacy
© 2013 John Wiley & Sons, Inc.
2
Administering Internet
Explorer
Lesson 7: Configuring Internet Explorer 11 and
Internet Explorer for the Desktop
© 2013 John Wiley & Sons, Inc.
3
Internet Explorer
• Windows 8.1 includes Internet Explorer Version
11.
• Internet Explorer 11 has two distinct interfaces.
o When you launch Internet Explorer 11 from the
desktop, you see the same familiar screen
arrangement as in previous versions, with a menu bar
and tabs across the top.
o When you launch Internet Explorer 11 by clicking the
tile on the Start screen, you initially see a screen with
a dark-colored address bar along the bottom, but
that soon disappears, leaving the entire screen filled
with the web page content.
© 2013 John Wiley & Sons, Inc.
4
Administering Internet Explorer
The IE Start screen interface
© 2013 John Wiley & Sons, Inc.
5
Administering Internet Explorer
The Internet Explorer Settings panel
© 2013 John Wiley & Sons, Inc.
6
Configuring Internet
Explorer
• As with earlier versions of Internet Explorer,
the browser satisfies most users’ needs with
no adjustment.
• However, some of the new features in
Internet Explorer 11 require configuration.
© 2013 John Wiley & Sons, Inc.
7
Configuring
Compatibility View
• To accommodate older pages, Internet Explorer 11
includes a feature called Compatibility View, which
enables the browser to display older pages
properly.
• When you select Tools, Compatibility View Settings
from the Tools menu, the Compatibility View
Settings dialog box appears.
• In this dialog box, you can maintain a list of web
sites for which you want to use Compatibility View
all of the time.
• For workstations on an Active Directory Domain
Services (AD DS) network, administrators can
configure Compatibility View settings using Group
Policy.
© 2013 John Wiley & Sons, Inc.
8
Configuring Compatibility View
The IE Compatibility View icon
© 2013 John Wiley & Sons, Inc.
9
Configuring Compatibility View
The IE Compatibility View Settings dialog box
© 2013 John Wiley & Sons, Inc.
10
Policy Settings for
Compatibility View
• Policy settings for Compatibility View are:
o Turn on Internet Explorer 7 Standards Mode
o Turn off Compatibility View
o Turn on Internet Explorer Standards Mode for
Local Intranet
o Turn off Compatibility View button
o Include updated website lists from Microsoft
o Use Policy list of Internet Explorer 7 sites
o Use policy list of quirks mode sites
© 2013 John Wiley & Sons, Inc.
11
Managing Add-ons
• To work with the Internet Explorer 11 add-ons
on a particular Windows 8.1 computer, you
open the Manage Add-ons dialog box by
clicking Tools\Manage Add-ons from either
the menu bar or the Tools toolbar button.
• The add-on types supported by Internet
Explorer 11are:
o
o
o
o
Toolbars and Extensions
Search Providers
Accelerators
Tracking Protection
© 2013 John Wiley & Sons, Inc.
12
Managing Add-ons
The Manage Add-ons dialog box
© 2013 John Wiley & Sons, Inc.
13
Configuring Search
Options
• By default, the Instant Search box found in
Internet Explorer enables users to perform
searches using Microsoft’s Bing engine.
• To use other search engines, you must first
install them to the list of search providers.
• Search providers are add-ons specifically
designed to conform to the syntax required
by other search engines.
© 2013 John Wiley & Sons, Inc.
14
Add a Search Provider
The Add-ons page of the Internet Explorer Gallery
© 2013 John Wiley & Sons, Inc.
15
Add a Search Provider
The Add Search Provider dialog box
© 2013 John Wiley & Sons, Inc.
16
Specify a Default Search Provider
The Search Providers list in the Manage Add-ons dialog
box
© 2013 John Wiley & Sons, Inc.
17
Configuring Accelerators
• By default, Internet Explorer 11 includes
accelerators that enable users to email
content, find it on a map, or translate it to
another language.
• By clicking the Find more accelerators link
on the Manage Add-ons dialog box, you
can install new accelerators from the
Microsoft Add-ons Gallery, using them to
replace or augment the default ones.
© 2013 John Wiley & Sons, Inc.
18
Configuring Accelerators
Using Group Policy
• Administrators can control the use of
accelerators on Windows 8.1 computers
using Group Policy.
• The Accelerators Group Policy settings are
as follows:
o
o
o
o
Add non-default Accelerators
Add default Accelerators
Turn off Accelerators
Restrict Accelerators to those deployed through
Group Policy
© 2013 John Wiley & Sons, Inc.
19
Configuring Download
Manager
• When you download a file from a web site in IE
11, the browser’s built-in download manager
takes over, prompting you confirm the
download with a dialog box.
• From this dialog box, you can do any of the
following:
o Download and run the selected file.
o Download and save the selected file to the
program’s default folder.
o Download and save the selected file to another
folder.
o Cancel the download.
© 2013 John Wiley & Sons, Inc.
20
Configuring Download Manager
Internet Explorer download options
© 2013 John Wiley & Sons, Inc.
21
Configuring Download Manager
Internet Explorer downloaded file options
© 2013 John Wiley & Sons, Inc.
22
Configuring Download Manager
The Internet Explorer View Downloads window
© 2013 John Wiley & Sons, Inc.
23
Securing Internet Explorer
• The web browser is the primary application
that most people use to access the Internet,
and as a result it is also a major point of
weakness from a security perspective.
• The security improvements included in the
Windows 8/8.1 release of Internet Explorer
provide users with the highest degree of
protection possible without compromising
their Internet experiences.
© 2013 John Wiley & Sons, Inc.
24
Understanding Protected
Mode
• Protected mode is an operational state
designed to prevent attackers that do
penetrate the computer’s defenses from
accessing vital system components.
• Protected mode is essentially a way to run
Internet Explorer with highly reduced
privileges. Windows 8.1 includes a security
feature called Mandatory Integrity Control
(MIC), which assigns various integrity access
levels to processes running on the computer.
© 2013 John Wiley & Sons, Inc.
25
Mandatory Integrity
Control
Integrity Access
Level
High
Privilege
Level
Administrator
Privileges
Medium
User
The process is granted limited access to the system,
including write access to user-specific areas, such
as the user’s Documents folder and the
HKEY_CURRENT_USER registry key. All processes
that are not explicitly assigned an integrity access
level receive this level of access.
Low
Untrusted
The process is granted minimal access to the
system, including write access only to the
Temporary Internet Files\Low folder and the
HKEY_CURRENT_USER\Software\Microsoft\Intern
et Explorer/LowRegistry registry key
© 2013 John Wiley & Sons, Inc.
The process is granted full access to the system,
including write access to the Program Files folder
and the HKEY_LOCAL_MACHINE registry key.
26
Detecting Protected Mode
Incompatibilities
• Because IE on Windows 8.1 runs in protected mode
by default, it is possible that web-based
applications designed to run on earlier versions
might not run properly.
• However, you might find that applications that did
not run under IE version 7 now do run in IE 11, using
the default settings.
• Once you have determined the exact source of
your application’s incompatibility, you can use the
following techniques to try to resolve the problem.
o Move the site to the Trusted Sites zone
o Disable protected mode in IE
o Modify the application
© 2013 John Wiley & Sons, Inc.
27
Detecting Protected Mode
Incompatibilities
Protected mode disabled
© 2013 John Wiley & Sons, Inc.
28
Enhanced Protected Mode
• Enhanced Protected Mode is an extension
of protected mode.
• Enhanced Protected Mode blocks
unauthorized access to addition system
resources, such as personal information and
corporate network resources.
© 2013 John Wiley & Sons, Inc.
29
Enhanced Protected Mode
Enabling Enhanced Protected Mode
© 2013 John Wiley & Sons, Inc.
30
Configuring Security
Zones
• To provide different levels of access to
specific applications, Internet Explorer uses
security zones, each of which has a different
set of privileges.
• The four zones are:
o
o
o
o
Restricted Sites
Internet
Local Intranet
Trusted Sites
© 2013 John Wiley & Sons, Inc.
31
Add a Site to a Security Zone
The Security tab of the Internet Options dialog box
© 2013 John Wiley & Sons, Inc.
32
Modify Security Zone Settings
The Security Settings dialog box for the Internet zone
© 2013 John Wiley & Sons, Inc.
33
SmartScreen Filter
• Internet Explorer 11 includes a component
called the SmartScreen Filter that examines
traffic for evidence of phishing activity and
displays a warning to the user if it finds any.
• The IE SmartScreen Filter uses three techniques
to identify potential phishing web sites:
o Online lookup of phishing sites
o Online lookup of download sites
o Onsite analysis
• You can disable it by clicking the Tools icon and
selecting Safety > Turn off SmartScreen Filter.
© 2013 John Wiley & Sons, Inc.
34
Using InPrivate Mode
• InPrivate Mode enables you to surf the
Internet without leaving any record of your
activities.
• To use InPrivate Browsing, you click the
Safety button on the toolbar and select
InPrivate Browsing. A new Internet Explorer
10 window appears.
© 2013 John Wiley & Sons, Inc.
35
Using InPrivate Browsing
InPrivate Browsing in Internet Explorer
© 2013 John Wiley & Sons, Inc.
36
Using InPrivate Mode
• InPrivate Filtering enables you to block
specific providers – or all providers – from
gathering that information.
• You can open a browser window that uses
InPrivate Filtering by clicking the Tools button
in the toolbar and selecting InPrivate
Filtering.
© 2013 John Wiley & Sons, Inc.
37
Using InPrivate Mode
• AD DS administrators can configure InPrivate
Mode settings for Windows 8.1 users all over the
network using Group Policy. The policy settings
for InPrivate Mode are:
o Establish InPrivate Filtering threshold
o Establish Tracking Protection threshold
o Prevent the computer from loading toolbars and
Browser Helper Objects when InPrivate Browsing starts
o Turn off collection of InPrivate Filtering data
o Turn off InPrivate Browsing
o Turn off InPrivate Filtering
o Turn off tracking protection
© 2013 John Wiley & Sons, Inc.
38
Browsing with
Certificates
• Secure Sockets Layer (SSL) is the protocol that most
web sites use when establishing secure connections
with clients over the Internet.
• SSL communications are based on a public key
infrastructure (PKI), which requires two encryptions
keys, a public one and a private one.
• A web server participating in a PKI receives a digital
certificate from a certification authority (CA), which
contains its public key. The server also generates a
private key, which it stores locally.
• When a Windows 8.1 IE user connects to a site that
is secured using SSL, a lock appears in the address
bar, along with the name of the organization to
which the CA issued the certificate.
© 2013 John Wiley & Sons, Inc.
39
Browsing with Certificates
A secure connection in IE 11
© 2013 John Wiley & Sons, Inc.
40
Browsing with Certificates
The Certificate dialog box
© 2013 John Wiley & Sons, Inc.
41
Lesson Summary
• Many of the pages on the Internet still conform to old
standards, and Internet Explorer 11 might not display them
properly. To accommodate these pages, Internet Explorer 11
includes a feature called Compatibility View, which enables
the browser to display older pages properly.
• One of the ways that IE interacts with other resources is
through the use of add-ons. Add-ons are separate software
components, created by Microsoft or by third parties, that
interact with the basic functions of the web browser.
• Accelerators enable users to send content to other resources,
in the form of applications running on the computer or other
sites on the Internet. Accelerators enable you to highlight
content in a browser window and select the accelerator for
the resource you want to receive that content.
© 2013 John Wiley & Sons, Inc.
42
Lesson Summary
• Many Websites that provide frequently changing content,
such as news sites and blogs, support a push technology
called RSS, which simplifies the process of delivering updated
content to designated users.
• Protected mode is a way to run Internet Explorer with highly
reduced privileges. Enhanced protected mode provides more
protection, at the cost of compatibility with some add-ons.
• Phishing is a technique that uses convincing-looking Websites
that urge users to supply personal information, such as
passwords and account numbers. Internet Explorer 8.1
includes a SmartScreen Filter that examines traffic for
evidence of phishing activity and displays a warning to the
user if it finds any.
© 2013 John Wiley & Sons, Inc.
43
Copyright 2013 John Wiley & Sons, Inc..
All rights reserved. Reproduction or translation of this work beyond that
named in Section 117 of the 1976 United States Copyright Act without the
express written consent of the copyright owner is unlawful. Requests for
further information should be addressed to the Permissions Department, John
Wiley & Sons, Inc.. The purchaser may make back-up copies for his/her own
use only and not for distribution or resale. The Publisher assumes no
responsibility for errors, omissions, or damages, caused by the use of these
programs or from the use of the information contained herein.