• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 29. Internet Security > Establishing and Maintaining Internet Security ...

Establishing and Maintaining Internet Security Zones

Internet Explorer 5.0 includes dozens of security settings. If you really went overboard in trying to tighten up Internet security by applying each option to individual Web sites, you would soon discover that managing such a system would be impractical. A nice feature of IE5 is that it lets you group sites into four security zones, each with its own high, medium, medium-low, or low security settings. Initially, as Table 29.1 shows, all sites are divided into two groups: those with default locations included in the zone and those with no default locations included in the zone. As part of a comprehensive security policy, you can designate specific Web sites as trusted or restricted, giving them greater or less access to machines inside your network.

Table 29.1. Security Zones at a Glance
Security ZoneDefault Locations Included in ZoneDefault Security Settings
Internet zoneAll Web sites not included in other zonesMedium
Local intranet zoneLocal intranet servers not included in other zones; all network paths; all sites that bypass proxy serverMedium
Trusted sites zoneNoneLow
Restricted sites zoneNoneHigh



PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint