Lesson 7: Configuring Internet Explorer 11 and Internet Explorer for the Desktop MOAC 70-687: Configuring Windows 8.1 Overview • Exam Objective 2.4: Configure Internet Explorer 11 and Internet Explorer for the desktop o Configure compatibility view o Configure Internet Explorer 11 settings, including add-ons, downloads, security, and privacy © 2013 John Wiley & Sons, Inc. 2 Administering Internet Explorer Lesson 7: Configuring Internet Explorer 11 and Internet Explorer for the Desktop © 2013 John Wiley & Sons, Inc. 3 Internet Explorer • Windows 8.1 includes Internet Explorer Version 11. • Internet Explorer 11 has two distinct interfaces. o When you launch Internet Explorer 11 from the desktop, you see the same familiar screen arrangement as in previous versions, with a menu bar and tabs across the top. o When you launch Internet Explorer 11 by clicking the tile on the Start screen, you initially see a screen with a dark-colored address bar along the bottom, but that soon disappears, leaving the entire screen filled with the web page content. © 2013 John Wiley & Sons, Inc. 4 Administering Internet Explorer The IE Start screen interface © 2013 John Wiley & Sons, Inc. 5 Administering Internet Explorer The Internet Explorer Settings panel © 2013 John Wiley & Sons, Inc. 6 Configuring Internet Explorer • As with earlier versions of Internet Explorer, the browser satisfies most users’ needs with no adjustment. • However, some of the new features in Internet Explorer 11 require configuration. © 2013 John Wiley & Sons, Inc. 7 Configuring Compatibility View • To accommodate older pages, Internet Explorer 11 includes a feature called Compatibility View, which enables the browser to display older pages properly. • When you select Tools, Compatibility View Settings from the Tools menu, the Compatibility View Settings dialog box appears. • In this dialog box, you can maintain a list of web sites for which you want to use Compatibility View all of the time. • For workstations on an Active Directory Domain Services (AD DS) network, administrators can configure Compatibility View settings using Group Policy. © 2013 John Wiley & Sons, Inc. 8 Configuring Compatibility View The IE Compatibility View icon © 2013 John Wiley & Sons, Inc. 9 Configuring Compatibility View The IE Compatibility View Settings dialog box © 2013 John Wiley & Sons, Inc. 10 Policy Settings for Compatibility View • Policy settings for Compatibility View are: o Turn on Internet Explorer 7 Standards Mode o Turn off Compatibility View o Turn on Internet Explorer Standards Mode for Local Intranet o Turn off Compatibility View button o Include updated website lists from Microsoft o Use Policy list of Internet Explorer 7 sites o Use policy list of quirks mode sites © 2013 John Wiley & Sons, Inc. 11 Managing Add-ons • To work with the Internet Explorer 11 add-ons on a particular Windows 8.1 computer, you open the Manage Add-ons dialog box by clicking Tools\Manage Add-ons from either the menu bar or the Tools toolbar button. • The add-on types supported by Internet Explorer 11are: o o o o Toolbars and Extensions Search Providers Accelerators Tracking Protection © 2013 John Wiley & Sons, Inc. 12 Managing Add-ons The Manage Add-ons dialog box © 2013 John Wiley & Sons, Inc. 13 Configuring Search Options • By default, the Instant Search box found in Internet Explorer enables users to perform searches using Microsoft’s Bing engine. • To use other search engines, you must first install them to the list of search providers. • Search providers are add-ons specifically designed to conform to the syntax required by other search engines. © 2013 John Wiley & Sons, Inc. 14 Add a Search Provider The Add-ons page of the Internet Explorer Gallery © 2013 John Wiley & Sons, Inc. 15 Add a Search Provider The Add Search Provider dialog box © 2013 John Wiley & Sons, Inc. 16 Specify a Default Search Provider The Search Providers list in the Manage Add-ons dialog box © 2013 John Wiley & Sons, Inc. 17 Configuring Accelerators • By default, Internet Explorer 11 includes accelerators that enable users to email content, find it on a map, or translate it to another language. • By clicking the Find more accelerators link on the Manage Add-ons dialog box, you can install new accelerators from the Microsoft Add-ons Gallery, using them to replace or augment the default ones. © 2013 John Wiley & Sons, Inc. 18 Configuring Accelerators Using Group Policy • Administrators can control the use of accelerators on Windows 8.1 computers using Group Policy. • The Accelerators Group Policy settings are as follows: o o o o Add non-default Accelerators Add default Accelerators Turn off Accelerators Restrict Accelerators to those deployed through Group Policy © 2013 John Wiley & Sons, Inc. 19 Configuring Download Manager • When you download a file from a web site in IE 11, the browser’s built-in download manager takes over, prompting you confirm the download with a dialog box. • From this dialog box, you can do any of the following: o Download and run the selected file. o Download and save the selected file to the program’s default folder. o Download and save the selected file to another folder. o Cancel the download. © 2013 John Wiley & Sons, Inc. 20 Configuring Download Manager Internet Explorer download options © 2013 John Wiley & Sons, Inc. 21 Configuring Download Manager Internet Explorer downloaded file options © 2013 John Wiley & Sons, Inc. 22 Configuring Download Manager The Internet Explorer View Downloads window © 2013 John Wiley & Sons, Inc. 23 Securing Internet Explorer • The web browser is the primary application that most people use to access the Internet, and as a result it is also a major point of weakness from a security perspective. • The security improvements included in the Windows 8/8.1 release of Internet Explorer provide users with the highest degree of protection possible without compromising their Internet experiences. © 2013 John Wiley & Sons, Inc. 24 Understanding Protected Mode • Protected mode is an operational state designed to prevent attackers that do penetrate the computer’s defenses from accessing vital system components. • Protected mode is essentially a way to run Internet Explorer with highly reduced privileges. Windows 8.1 includes a security feature called Mandatory Integrity Control (MIC), which assigns various integrity access levels to processes running on the computer. © 2013 John Wiley & Sons, Inc. 25 Mandatory Integrity Control Integrity Access Level High Privilege Level Administrator Privileges Medium User The process is granted limited access to the system, including write access to user-specific areas, such as the user’s Documents folder and the HKEY_CURRENT_USER registry key. All processes that are not explicitly assigned an integrity access level receive this level of access. Low Untrusted The process is granted minimal access to the system, including write access only to the Temporary Internet Files\Low folder and the HKEY_CURRENT_USER\Software\Microsoft\Intern et Explorer/LowRegistry registry key © 2013 John Wiley & Sons, Inc. The process is granted full access to the system, including write access to the Program Files folder and the HKEY_LOCAL_MACHINE registry key. 26 Detecting Protected Mode Incompatibilities • Because IE on Windows 8.1 runs in protected mode by default, it is possible that web-based applications designed to run on earlier versions might not run properly. • However, you might find that applications that did not run under IE version 7 now do run in IE 11, using the default settings. • Once you have determined the exact source of your application’s incompatibility, you can use the following techniques to try to resolve the problem. o Move the site to the Trusted Sites zone o Disable protected mode in IE o Modify the application © 2013 John Wiley & Sons, Inc. 27 Detecting Protected Mode Incompatibilities Protected mode disabled © 2013 John Wiley & Sons, Inc. 28 Enhanced Protected Mode • Enhanced Protected Mode is an extension of protected mode. • Enhanced Protected Mode blocks unauthorized access to addition system resources, such as personal information and corporate network resources. © 2013 John Wiley & Sons, Inc. 29 Enhanced Protected Mode Enabling Enhanced Protected Mode © 2013 John Wiley & Sons, Inc. 30 Configuring Security Zones • To provide different levels of access to specific applications, Internet Explorer uses security zones, each of which has a different set of privileges. • The four zones are: o o o o Restricted Sites Internet Local Intranet Trusted Sites © 2013 John Wiley & Sons, Inc. 31 Add a Site to a Security Zone The Security tab of the Internet Options dialog box © 2013 John Wiley & Sons, Inc. 32 Modify Security Zone Settings The Security Settings dialog box for the Internet zone © 2013 John Wiley & Sons, Inc. 33 SmartScreen Filter • Internet Explorer 11 includes a component called the SmartScreen Filter that examines traffic for evidence of phishing activity and displays a warning to the user if it finds any. • The IE SmartScreen Filter uses three techniques to identify potential phishing web sites: o Online lookup of phishing sites o Online lookup of download sites o Onsite analysis • You can disable it by clicking the Tools icon and selecting Safety > Turn off SmartScreen Filter. © 2013 John Wiley & Sons, Inc. 34 Using InPrivate Mode • InPrivate Mode enables you to surf the Internet without leaving any record of your activities. • To use InPrivate Browsing, you click the Safety button on the toolbar and select InPrivate Browsing. A new Internet Explorer 10 window appears. © 2013 John Wiley & Sons, Inc. 35 Using InPrivate Browsing InPrivate Browsing in Internet Explorer © 2013 John Wiley & Sons, Inc. 36 Using InPrivate Mode • InPrivate Filtering enables you to block specific providers – or all providers – from gathering that information. • You can open a browser window that uses InPrivate Filtering by clicking the Tools button in the toolbar and selecting InPrivate Filtering. © 2013 John Wiley & Sons, Inc. 37 Using InPrivate Mode • AD DS administrators can configure InPrivate Mode settings for Windows 8.1 users all over the network using Group Policy. The policy settings for InPrivate Mode are: o Establish InPrivate Filtering threshold o Establish Tracking Protection threshold o Prevent the computer from loading toolbars and Browser Helper Objects when InPrivate Browsing starts o Turn off collection of InPrivate Filtering data o Turn off InPrivate Browsing o Turn off InPrivate Filtering o Turn off tracking protection © 2013 John Wiley & Sons, Inc. 38 Browsing with Certificates • Secure Sockets Layer (SSL) is the protocol that most web sites use when establishing secure connections with clients over the Internet. • SSL communications are based on a public key infrastructure (PKI), which requires two encryptions keys, a public one and a private one. • A web server participating in a PKI receives a digital certificate from a certification authority (CA), which contains its public key. The server also generates a private key, which it stores locally. • When a Windows 8.1 IE user connects to a site that is secured using SSL, a lock appears in the address bar, along with the name of the organization to which the CA issued the certificate. © 2013 John Wiley & Sons, Inc. 39 Browsing with Certificates A secure connection in IE 11 © 2013 John Wiley & Sons, Inc. 40 Browsing with Certificates The Certificate dialog box © 2013 John Wiley & Sons, Inc. 41 Lesson Summary • Many of the pages on the Internet still conform to old standards, and Internet Explorer 11 might not display them properly. To accommodate these pages, Internet Explorer 11 includes a feature called Compatibility View, which enables the browser to display older pages properly. • One of the ways that IE interacts with other resources is through the use of add-ons. Add-ons are separate software components, created by Microsoft or by third parties, that interact with the basic functions of the web browser. • Accelerators enable users to send content to other resources, in the form of applications running on the computer or other sites on the Internet. Accelerators enable you to highlight content in a browser window and select the accelerator for the resource you want to receive that content. © 2013 John Wiley & Sons, Inc. 42 Lesson Summary • Many Websites that provide frequently changing content, such as news sites and blogs, support a push technology called RSS, which simplifies the process of delivering updated content to designated users. • Protected mode is a way to run Internet Explorer with highly reduced privileges. Enhanced protected mode provides more protection, at the cost of compatibility with some add-ons. • Phishing is a technique that uses convincing-looking Websites that urge users to supply personal information, such as passwords and account numbers. Internet Explorer 8.1 includes a SmartScreen Filter that examines traffic for evidence of phishing activity and displays a warning to the user if it finds any. © 2013 John Wiley & Sons, Inc. 43 Copyright 2013 John Wiley & Sons, Inc.. All rights reserved. Reproduction or translation of this work beyond that named in Section 117 of the 1976 United States Copyright Act without the express written consent of the copyright owner is unlawful. Requests for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc.. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.
© Copyright 2026 Paperzz