Contents Overview Lesson: Configuring Security and Connection Settings for Internet Explorer Lesson:

pdf
Số trang Contents Overview Lesson: Configuring Security and Connection Settings for Internet Explorer Lesson: 38 Cỡ tệp Contents Overview Lesson: Configuring Security and Connection Settings for Internet Explorer Lesson: 5 MB Lượt tải Contents Overview Lesson: Configuring Security and Connection Settings for Internet Explorer Lesson: 0 Lượt đọc Contents Overview Lesson: Configuring Security and Connection Settings for Internet Explorer Lesson: 0
Đánh giá Contents Overview Lesson: Configuring Security and Connection Settings for Internet Explorer Lesson:
4.2 ( 15 lượt)
Nhấn vào bên dưới để tải tài liệu
Đang xem trước 10 trên tổng 38 trang, để tải xuống xem đầy đủ hãy nhấn vào bên trên
Chủ đề liên quan

Nội dung

Contents Module 5: Configuring Internet Explorer and Application Compatibility Overview 1 Lesson: Configuring Security and Connection Settings for Internet Explorer 2 Lesson: Customizing and Deploying Internet Explorer Settings 9 Lesson: Configuring Applications for Windows XP Professional 21 Lesson: Troubleshooting Applications 25 Demonstration: Viewing Dr. Watson 27 Course Evaluation 30 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.  2003 Microsoft Corporation. All rights reserved. Microsoft, MS-DOS, Windows, Windows NT, ActiveX, Active Directory, MSDN, PowerPoint, and Windows Media are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Module 5: Configuring Internet Explorer and Application Compatibility iii Instructor Notes Presentation: 90 minutes This module introduces students to the security and connection settings for Microsoft® Internet Explorer. Students will learn the methods for deploying and enforcing Internet settings. This module also provides students with information about configuring applications that are designed for earlier versions of Microsoft Windows®, and how to gather information by using the Dr. Watson program error debugging utility. Lab: 00 minutes Required materials There is no lab for this module. After completing this module, students will be able to: ! Configure the security and connection settings for Internet Explorer. ! Use the Internet Explorer Administration Kit. ! Use Group Policy to customize and deploy Internet settings. ! Configure a program that was written for an earlier version of Windows to operate on Windows XP Professional. ! Configure the Dr. Watson utility to troubleshoot applications. The following materials are required for teaching this module: ! Microsoft PowerPoint® file 2285A_05.ppt. ! The DemoApp.exe and Drwtsn32.log files on the Trainer Materials compact disc. Important It is recommended that you use PowerPoint 2002 or later to display the slides for this course. If you use PowerPoint Viewer or an earlier version of PowerPoint, all the features of the slides may not appear correctly. Preparation tasks To prepare for this module: ! Read all the materials for this module. ! Complete the practices. ! Read the materials listed under Additional readings for each topic. Document your additional readings to share with the class. iv Module 5: Configuring Internet Explorer and Application Compatibility How to Teach This Module This section contains information that will help you to teach this module. For some topics in this module, references to additional information appear in notes at the end of the topic. Read the additional information in preparation for teaching the module and, during class, ensure that students are aware of that additional information. Demonstration Pages, Practices, and Labs Explain to the students how the demonstrations, practices, and labs are designed for this course. A module includes two or more lessons. Most lessons include demonstration pages and a practice. Demonstration pages Demonstration pages provide the steps for demonstrating a task. Students do not perform the tasks on these pages with the instructor, but will use these steps to perform the practice at the end of each lesson. Practices After you presented the contents of the topic and demonstrated the procedures for the lesson, explain that the practice gives students a hands-on opportunity to learn all the tasks that you discussed in the lesson. Lesson: Configuring Security and Connection Settings for Internet Explorer This section describes the instructional methods for teaching this lesson. This lesson teaches students the basic methods of configuring Internet Explorer for security and connections. Focus on the reasons for making the settings, and how to make settings on a computer-by-computer basis. Why Configure Internet Explorer Settings? The slide for this topic depicts a high-level view of a secure network topology and shows that configuring the client is only a part of a corporate security policy. Briefly describe: Security Zones for Internet Explorer ! The dangers of active content. ! Firewall rules, and how they protect corporate computers. ! How to improve Internet access by using a proxy server. ! How dial-up connections from the desktop can bypass the outbound security and access features of a firewall and a proxy server. To introduce security zones, briefly demonstrate the settings on the Security Zones tab and the other tabs on the Internet Options menu. Indicate that students can manage certificates on the Content tab. Do not discuss certificates, which are beyond the scope of this course. Students will investigate the Local intranet security zone in the practice for this lesson, so focus your demonstrations of security zones on the other options. When you describe the security options in a security zone, refer to discussions about harmful content from the previous topic. Module 5: Configuring Internet Explorer and Application Compatibility v Connection Settings for Internet Explorer This topic gives students an understanding of the connections that are used for dial-up and virtual private network (VPN) access, and why such connections are typically not used in a local area network (LAN). Concentrate on a proxy configuration for the dial-up connections, the VPN connections, and the LAN settings. Briefly demonstrate how to set up a proxy server for different protocols, but advise students that they will usually configure a single proxy for all protocols. Practice: Protecting Clients from Active Content Explain to students that practices provide hands-on learning of the tasks that are presented in this lesson. In this practice, students will use Internet options. If time permits, encourage students to investigate settings that are not presented in the practice. Estimated time to complete this practice: 10 minutes. Lesson: Customizing and Deploying Internet Settings Methods for Customizing and Deploying Internet Explorer Settings How to Customize Internet Explorer In this lesson, introduce the following methods for maintaining the Internet Explorer security options that you configured manually in the previous lesson, and discuss when you might use them. Note that the first two items are located in the Internet Explorer Administration Kit (IEAK): ! Internet Explorer Customization Wizard (IECW), which creates custom packages for distributing Internet Explorer. ! IEAK Profile Manager, which maintains the deployed browsers. ! Group Policy Management Console, which provides maintenance of Internet Explorer settings, but requires Microsoft Active Directory® directory service and Group Policy. In this topic, describe the IECW and how it creates browser packages. Before teaching this topic, download IEAK SP1 from: http://www.microsoft.com/ windows/ieak/downloads/ieak6/download.asp. After downloading the IEAK, familiarize yourself with the versions and licensing of the kit. For this course, the corporate license is installed on student computers, and the automatic version synchronization (AVS) has run once so that the practice will work. If you want to provide a brief demonstration of IEAK, select Flat for the Media Selection and use Connections Customization for the feature selection. Students will use Security Zones and Content ratings in the practice. Discuss the concepts of Group Policy, and how the linking of Group Policy objects to appropriate container objects in Active Directory enforces settings and software configuration for all objects in the Active Directory container. Explain that, by using the Internet Explorer Maintenance (IEM) extension to Group Policy, students can maintain browsers by making settings that Group Policy objects can deploy. Reiterate that the IEM extension requires Active Directory. vi Module 5: Configuring Internet Explorer and Application Compatibility Practice: Configuring Internet Explorer Settings by Using Internet Explorer Customization Wizard In this practice, students will use the IECW to configure Internet Explorer settings. Important This practice is optional. Configuring the Internet Explorer Customization Wizard during setup requires an Internet connection. Verify that IEAK is installed and configured properly prior to the students running this practice. Demonstration: Using Group Policy In this demonstration, use the Group Policy Management Console (GPMC) to demonstrate the use of Group Policy. The GPMC consists of IEM, which is a Microsoft Management Console (MMC) extension, and a set of scriptable interfaces for managing Group Policy. Describe GPMC to your students, and advise them that GPMC is a separate component from Windows Server 2003. To prepare for this demonstration, familiarize yourself with how the console works, and complete all the steps in the demonstration before teaching this module. Guidelines for Configuring Internet Explorer In this topic, discuss the best practices for configuring Internet Explorer. Best practices include setting restrictions that apply an organization’s acceptable-use policy. Best practices must also include enforcing settings by disabling a user’s ability to change the browser’s security-related settings. Discuss the policies of the students’ organizations to give students an opportunity to learn from each other. Lesson: Configuring Applications for Microsoft Windows XP Professional In this lesson, explain to students that you have finished the discussion about security issues with browsers, and that this lesson addresses information about applications. What Is Program Compatibility? Program compatibility involves applying small pieces of code that enable programs written for earlier versions of Windows to run on Windows XP Professional. Show students that they can ensure program compatibility either manually or by using a wizard. Demonstrate the manual method by using Microsoft Notepad. How to Use the Program Compatibility Wizard In this topic, describe how to run the Program Compatibility Wizard. Lesson: Troubleshooting Applications In this lesson, introduce students to the Windows application debugger, Dr. Watson, and show them how to read Dr. Watson log files. What Is Dr. Watson? In this topic, describe the Dr. Watson utility and how to use it. It is unlikely that students are application developers, so focus on using Dr. Watson to diagnose problems and create reports for support organizations. The examples in the text are also located in a log file on the Trainer Materials compact disc. Demonstration: Viewing Dr. Watson In this demonstration, show students how to open the Dr. Watson for Windows dialog box and how to view the log file. Point out the different parts of the file, including the application exception, system information, task list, module list, state dump, and symbol table. Module 5: Configuring Internet Explorer and Application Compatibility vii Assessment Assessment questions for this module are located on the Student Materials compact disc. You can use them as pre-instruction assessments to help students identify areas of difficulty, or you can use them as post-instruction assessments to validate learning. Consider using assessments to reinforce learning at the end of the day. You can also use assessments at the beginning of the day to review information that you taught on the previous day. Module 5: Configuring Internet Explorer and Application Compatibility 1 Overview *****************************ILLEGAL FOR NON-TRAINER USE****************************** Introduction In this module, you will learn how to configure security and connection settings for Internet Explorer to ensure that users have appropriate access to the Internet and intranet. You will also learn how to configure applications so that they are compatible with Microsoft® Windows® XP Professional. Objectives After completing this module, you will be able to: ! Configure security and connection settings for Internet Explorer. ! Use the Internet Explorer Administration Kit (IEAK) and Group Policy to customize and deploy Internet settings. ! Configure applications written for earlier versions of Windows to operate on computers running Windows XP Professional. ! Configure the Dr. Watson debugging utility to troubleshoot applications. 2 Module 5: Configuring Internet Explorer and Application Compatibility Lesson: Configuring Security and Connection Settings for Internet Explorer *****************************ILLEGAL FOR NON-TRAINER USE****************************** Introduction Your organization’s acceptable-use policy describes when users may download and run software from other hosts, and whether application components must be digitally signed. Configure Internet Explorer to support this policy, to support and augment network security, and to protect individual users’ desktop computers. Lesson objectives After completing this lesson, you will be able to: ! Describe the reasons to configure security and connection settings for Internet Explorer. ! Describe Internet Explorer security options. ! Configure security and connection settings for Internet Explorer.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.