programming4us
programming4us
SECURITY

Managing Internet Explorer Security Zones

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

Internet Explorer security zones play an important role in ensuring the security of Windows Vista systems. You can use security zones to restrict or permit access to specific types of Web content, including ActiveX controls and plug-ins, file and font downloads, Java applets, and scripts. You can also use security zones to control the types of actions users can perform while viewing Web content. For example, you can enable launching of programs within an internal browser frame, known as an IFRAME, but disable installation of desktop items.

Group Policy can be used to manage security zones in several ways. You can set policies that control the user actions with regard to security zones and customize the settings for each security zone. Before exploring how these procedures are implemented, let's look at what security zones are and how they are used.

Understanding Security Zones

Security zones are used to control Web content permissions for various content servers based on where they are located and what is known about them. Each security zone is assigned a default security level, which ranges from low to high. Low security means that most actions are permitted and the security restrictions are very relaxed. High security means that most actions are disabled and the security restrictions are very stringent.

You can override the security level by assigning a new security level or setting a custom level. Either way, the security level consists of dozens of parameters that typically are enabled, disabled, or set to prompt a user before the related feature can be invoked. The security zones to which the parameters apply are as follows:

  • Restricted Sites Controls user access to Web content on sites that could potentially damage a computer or its data. Default security level is High.

    Security With Windows Vista, the Binary And Script Behaviors security setting is disabled by default in the Restricted Sites zone. This important security change is designed to prevent the execution of scripts and other components that encapsulate functionality for HTML elements. In other zones, Binary And Script Behaviors is enabled by default, which could allow the execution of malicious scripts.

  • Trusted Sites Controls user access to Web content on sites that are explicitly trusted and are considered to be free of content that could damage or harm the computer and its data. Default security level is a slightly modified version of Low, which allows downloading of unsigned ActiveX controls and sets Java permissions to Medium security.

  • Local Intranet Controls user access to Web content on the local network, which can include local (intranet) sites, sites bypassed by the proxy server, and all network paths, such as Universal Naming Conventions (UNCs). Default security level is Medium-Low.

  • Internet Controls users' access to Web content on all sites not placed in other zones. Default security level is Medium-High.

Obvious security risks result from the enabling of ActiveX controls, plug-ins, Java applets, scripts, and downloads. A not-so-obvious risk results from the Logon parameter, which determines whether user name and password information is sent automatically to content servers when a logon is needed. Of all the available parameters, Logon is the one that most people overlook. The key risk from the Logon parameter is that computers outside the network can gain access to logon names for your network and unauthorized external users could use the logon names to stage attacks on your system.

With the Logon parameter, all security levels except High present a potential security risk:

  • With High security, content servers prompt for a user name and password when a logon is needed, and information is never passed automatically.

  • With Medium-High, Medium, or Medium-Low security, the current user name and password are automatically returned for logon requests to resources in the Intranet zone. Unlike earlier versions of Windows, Windows Vista uses automatic intranet network detection by default so the current user name and password are only returned for resources on the intranet network. If Windows Vista is unable to detect the intranet network automatically, you may need to manually configure the intranet zone settings. In this case, intranet sites, network paths (UNCs), and sites bypassed by the proxy server could all be considered as being in the intranet zone. And it is the bypassed sites that are easy to forget when you're considering possible security issues. 

  • With Low security, logon information is returned for logon requests from content servers in any zone. This is a dangerous setting when used with external content servers.

Controlling Security Zone Usage Through Group Policy

As you set out to better manage security zone usage, you might want to implement restrictions on who can change security zone settings and how settings are applied. Several policies control security zone modification and usage:

  • Security Zones: Use Only Machine Settings Enabling this policy sets security zone settings by machine rather than by user. The policy is intended to ensure that security zones are consistently applied to all users of a computer. Unfortunately, if you enable this policy without also preventing users from changing security zones, any user could make changes to security zones that affect all other users of the computer. This policy is located under Computer Configuration\Administrative Templates\Windows Components\Internet Explorer.

  • Security Zones: Do Not Allow Users To Change Policies Enabling this policy prevents users from changing security zone settings. If you enable this policy, the Custom Level and Default Level buttons are disabled on the Security tab of the Internet Properties dialog box. This prevents users from changing the security zone settings established by the administrator. This policy is located under Computer Configuration\Administrative Templates\Windows Components\Internet Explorer.

  • Security Zones: Do Not Allow Users To Add/Delete Sites Enabling this policy disables the Sites button on the Security tab of the Internet Properties dialog box. This prevents users from modifying the site management settings for the Local Intranet, Trusted Sites, and Restricted Sites zones, which means users cannot add sites, remove sites, or change the Include settings for the Local Intranet zone. This policy is located under Computer Configuration\Administrative Templates\Windows Components\Internet Explorer.

  • Disable The Security Page Enabling this policy removes the Security tab in the Internet Properties dialog box. This prevents users from making any changes to security zones. This policy takes precedence and overrides Security Zones: Do Not Allow Users To Change Policies and Security Zones: Do Not Allow Users To Add/Delete Sites. This policy is located under User Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel.

Enable one or more of these policies to enforce restrictions on changing security zone settings. Double-click the policy, select Enabled, and then click OK.

Windows Vista includes policies for locking down the local machine security zone. This special security zone applies only to the security of the local computer and is designed to prevent users from making changes that could materially affect the security of their computers. Any policies set under User Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Local Machine Zone are locked out in the local machine zone and set according to their policy configuration. Rather than setting each policy individually, you can use the Locked-Down Local Machine Zone Template policy under User Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page to set the local machine zone security so that it is consistent with a specific security level.

Configuring Security Zones Through Group Policy

Through Group Policy, you can implement standard settings for each security zone and deploy these settings to users of one or more computers. Before doing this, you'll need to configure the security settings for each of the four security zones, starting with the Internet security zone. Once you configure the zones, you can import the settings into the Security Zones And Content Ratings policy by following this procedure:

  1. Configure each of the four security zones as discussed in this chapter. When you are finished, access User Configuration\Windows Settings\Internet Explorer Maintenance\Security in Group Policy and then double-click Security Zones And Content Ratings.

  2. Select Import The Current Security Zone Settings And Privacy Settings and then click Modify Settings. You can now check the security zone settings you defined previously.

  3. When you are finished, click OK twice to apply the policy.

Configuring the Internet Security Zone

The Internet security zone sets Web content permissions for all sites not placed in other zones. The default security level for the Internet Security zone is Medium-High. Follow these steps to configure the Internet security zone:

  1. Access the Internet Properties dialog box and then select the Security tab.

  2. Select Internet from the zone list.

  3. To restore the default level if it was changed, click Default Level. Then click OK and skip the remaining steps.

  4. To set a different or custom level, click Custom Level. You can use the Security Settings dialog box to set a custom level for individual parameters or reset the zone to a preset security level.

  5. If you want to use a custom level, use the buttons provided to set individual parameters and then click OK.

  6. If you want to reset the zone to a particular security level, select the level using the Reset To drop-down list, click Reset, and then click OK. The standard security levels that can be used for this zone are Medium, Medium-High, and High.

Configuring the Local Intranet Zone

The Local Intranet security zone sets Web content permissions on the local network. The default security level is Medium-Low. You can configure this zone by completing these steps:

  1. In the Internet Properties dialog box, click the Security tab and then click Local Intranet in the zone list.

  2. Next define which sites are included in the Local Intranet zone by clicking Sites. This displays the Local Intranet dialog box, shown in Figure 1.

    Image from book
    Figure 1: If automatic detection doesn't work, optimize the Local Intranet settings for your environment by including or excluding various options.

  3. By default, Internet Explorer attempts to automatically detect whether the user is on the intranet network and if so, sets address checking appropriately. If Windows Vista is unable to detect the intranet network automatically, you may need to manually configure the intranet zone settings. To do this, clear Automatically Detect Intranet Network and then include or exclude local (intranet) sites not listed in other zones, sites that bypass the proxy server, and network paths (UNCs). To include a resource, select the related check box. To exclude a resource, clear the related check box.

  4. If you want to specify additional sites for the Local Intranet zone or require secure verification using Hypertext Transfer Protocol Secure (HTTPS) for all servers in the Local Intranet zone, click Advanced. This displays a new Local Intranet dialog box, in which you can do the following:

    • q Add a site by typing its IP address in the Add This Web Site To The Zone text box and then clicking Add.

    • q Remove previously defined sites by selecting the site in the Web Sites list box and then clicking Remove.

    • q Require secure verification using HTTPS by selecting Require Server Verification (HTTPS:) For All Sites In This Zone.

  5. Click OK twice to close the Local Intranet dialog boxes.

Configuring the Trusted Sites Security Zone

The Trusted Sites security zone sets Web content permissions for sites that are explicitly trusted and are considered to be free of potentially offensive or unauthorized content and content that could damage or harm the computer. By default, the security level for this zone is set to Low. You can configure this zone by completing these steps:

  1. In the Internet Properties dialog box, click the Security tab and then click Trusted Sites in the zone list.

  2. Click Sites to define which sites are included in the Trusted Sites zone. This displays the Trusted Sites dialog box.

  3. You can now add and remove trusted sites from this zone. All Web sites in this zone will use the zone's security settings. To add a site, type its IP address in the Add This Web Site To The Zone text box and then click Add. To remove a site, select the site in the Web Sites list box and then click Remove.

  4. You can also require secure verification using HTTPS. Select Require Server Verification (HTTPS:) For All Sites In This Zone to enable this feature, or clear the related check box to disable this feature.

  5. Click OK.

Configuring the Restricted Sites Security Zone

The Restricted Sites security zone sets permissions for sites with potentially offensive or unauthorized content and content that could damage or harm the computer. By default, the security level for this zone is set to High. You can place sites on the restricted list by completing the following steps:

  1. In the Internet Properties dialog box, click the Security tab and then click Restricted Sites in the zone list.

  2. Click Sites to define which sites are included in the Restricted Sites zone. This displays the Restricted Sites dialog box.

  3. To add a restricted site, type its IP address in the Add This Web Site To The Zone text box and then click Add.

  4. To remove a site, select the site in the Web Sites list box and then click Remove.

  5. Click OK twice to close the Restricted Sites and Internet Properties dialog boxes.


    Note 

    Site restrictions don't prevent users from accessing unauthorized sites; they merely establish a different security level for these sites. To prevent users from accessing restricted sites, you need to configure a proxy server or firewall.

Other  
 
Top 10
Free Mobile And Desktop Apps For Accessing Restricted Websites
MASERATI QUATTROPORTE; DIESEL : Lure of Italian limos
TOYOTA CAMRY 2; 2.5 : Camry now more comely
KIA SORENTO 2.2CRDi : Fuel-sipping slugger
How To Setup, Password Protect & Encrypt Wireless Internet Connection
Emulate And Run iPad Apps On Windows, Mac OS X & Linux With iPadian
Backup & Restore Game Progress From Any Game With SaveGameProgress
Generate A Facebook Timeline Cover Using A Free App
New App for Women ‘Remix’ Offers Fashion Advice & Style Tips
SG50 Ferrari F12berlinetta : Prancing Horse for Lion City's 50th
- Messages forwarded by Outlook rule go nowhere
- Create and Deploy Windows 7 Image
- How do I check to see if my exchange 2003 is an open relay? (not using a open relay tester tool online, but on the console)
- Creating and using an unencrypted cookie in ASP.NET
- Directories
- Poor Performance on Sharepoint 2010 Server
- SBS 2008 ~ The e-mail alias already exists...
- Public to Private IP - DNS Changes
- Send Email from Winform application
- How to create a .mdb file from ms sql server database.......
programming4us programming4us
programming4us
 
 
programming4us