• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 23. Keeping Your Internet Connec... > Establishing and Maintaining Interne...

Establishing and Maintaining Internet Security Zones

Internet Explorer 5.5 includes dozens of security settings. If you really went overboard in trying to tighten up Internet security by applying each option to individual Web sites, you would soon discover that managing such a system would be impractical. A nice feature of IE5.5 is that it lets you group sites into four security zones, each with its own high, medium, medium-low, or low security settings. Initially, as Table 23.1 shows, all sites are divided into two groups: those with default locations included in the zone and those with no default locations included in the zone. As part of a comprehensive security policy, you can designate specific Web sites as trusted or restricted, giving them greater or less access to machines inside your network.

Table 23.1. Security Zones at a Glance
Security ZoneDefault Locations Included in ZoneDefault Security Settings
Internet zoneAll Web sites not included in other zonesMedium
Local intranet zoneLocal intranet servers not included in other zones; all network paths; all sites that bypass proxy serverMedium-low
Trusted sites zoneNoneLow
Restricted sites zoneNoneHigh



PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint