Security

Security on the Internet: Overview
Alerts and certificates
Displaying security alerts
Managing security certificates
Active Content
Controlling cookie downloads
Deleting a cookie
Disabling or enabling a cookie
Viewing cookie information
Downloading ActiveX Controls
Running Java applets
Viewing the Java messages log
Using scripting
Internet ratings
What are Internet Ratings?
Screening out inappropriate content
Adjusting the type of content others can see
Allowing others to view unrated content
Allowing others to view restricted content
Using a ratings bureau
Security zones
What are security zones?
Setting a security level for each zone
Assigning a Web site to a security zone


Security on the Internet: Overview

The Internet works by sending information from computer to computer until the information reaches its destination. So when data is sent from point A to point B, every computer in between has an opportunity to look at what's being sent. This can pose a security problem.

For example, suppose you see a clothing catalog on the World Wide Web, and you decide to buy a shirt. This requires that you type certain facts, including your credit card number, into an order form. You know the clothing company in question is reputable, so you type your information, and then send the completed form. Your information passes from computer to computer on its way to the clothing company. Unfortunately, one of the computers in between has been infiltrated by criminals who watch the data passing through that computer until they see something interesting, such as your credit card number.

Another security problem relates to how files and programs are sent and received between Web sites and your computer. With no security protection, you could run or download files and programs from the Internet that can damage your computer and the information stored on it.

Microsoft Internet Explorer helps to protect you and your data by supporting the following security standards:

Related Topics
Displaying security alerts
Managing security certificates

Return to top

To display security alerts

  1. On the Edit menu, click Preferences.
  2. Under Web Browser, click Security.
  3. Select the check boxes that correspond to alerts you want to see.
Tips

Related Topic
Assigning a Web site to a security zone

Return to top

To manage security certificates

A certificate is a statement guaranteeing the security of a Web site. A Web site certificate verifies that a specific Web site is secure and genuine. It ensures that no other Web site can assume the identity of the original secure site. Web site certificates are also dated when issued.

When you try to open an organization's Web site, Internet Explorer verifies that the Internet address stored in the certificate is correct and that the current date precedes the expiration date. Internet Explorer verifies the following:

If any of the information above is false, Internet Explorer displays a security alert. Also for security purposes, Internet Explorer does not allow for the addition of certificates (whether from a corporate server or a personal certificate).

  1. On the Edit menu, click Preferences.
  2. Under Web Browser, click Security.
  3. Select a certificate from the list, and then do one of the following:
  4. To set up a password so that others will not be able to make changes to your certificates, click Set Password.
  5. To return to your default settings, click Reset to Defaults. This restores any certificates that you have removed and deletes your password.
Related Topic
Displaying security alerts

Return to top

To control cookie downloads

  1. On the Edit menu, click Preferences.
  2. Under Receiving Files, click Cookies.
  3. From the When Receiving Cookies menu, select a setting.

Related Topics
Deleting a cookie
Enabling and disabling a cookie
Glossary (cookies)
Viewing cookie information

Return to top

To delete a cookie

  1. On the Edit menu, click Preferences.
  2. Under Receiving Files, click Cookies.
  3. In the list, select the cookie you want to delete.
  4. Click Delete.
    The next time you visit the site whose cookie you deleted, a new cookie will be downloaded.
Related Topics
Downloading a cookie
Enabling and disabling a cookie
Glossary (cookies)

Return to top

To disable or enable a cookie

This feature applies only if the When Receiving Cookies feature is set to Ask For Each Site or Ask For Each Cookie.

  1. On the Edit menu, click Preferences.
  2. Under Receiving Files, click Cookies.
  3. In the list, select the cookie whose setting you want to change.
  4. Click Accept Cookie/Decline Cookie.
    The actual text on the button will change depending on the state of the cookie that you have selected.
Related Topics
Deleting a cookie
Glossary (cookies)
Viewing cookie information

Return to top

To view cookie information

  1. On the Edit menu, click Preferences.
  2. Under Receiving Files, click Cookies.
  3. In the list, select the cookie whose information you want to view.
  4. Click View.
Related Topics
Deleting a cookie
Glossary (cookies)

Return to top

To download ActiveX Controls

  1. On the Edit menu, click Preferences.
  2. Under Web Browser, click Web Content.
  3. Select the Enable ActiveX check box.
Related Topics
Displaying security alerts
Glossary (ActiveX)

Return to top

To run Java applets

  1. On the Edit menu, click Preferences.
  2. Under Web Browser, click Java.
  3. Select the Enable Java check box.
  4. Select a Java Virtual Machine.
  5. If you want a warning message to appear when an error occurs, select the Alert on Exception check box.
  6. If you want the Java output to be stored in the Java messages log, select the Log Java Output check box.
  7. If you want Java errors to be stored in the Java messages log, select the Log Java Exceptions check box.
  8. If you have downloaded Java classes from the Internet to your computer and want to use them, click Add and locate the folder containing the Java classes.
  9. Select one of the following options from the Byte-Code Verification menu.

    Don't Check Code The lowest form of verification. Neither byte code on your local drive nor on the network are inspected.
    Check Remote Code Only applets coming from the network are inspected. Any byte code that may previously have been installed on your local drive will not be verified.
    Check All Code The highest form of verification. Byte code coming from both your local drive and the network is inspected.

  10. Select one of the following from the Network Access menu:
    Applet Host Access Medium-level security: After an applet is downloaded, it can send and receive information only to and from the server from which it was downloaded.
    No Network Access High-level security. After an applet is downloaded, it cannot access any servers on the Internet.
    Unrestricted Access Low-level security. Java applets can send and receive information to and from any server on the Internet.
  11. To prevent Java applets from reading, creating, or modifying files on your local hard disk, select the Restrict Access To Non-Java Class Files check box. When this box is selected, Java applets have access only to files essential to the program.
Tip

Related Topic
Viewing the Java messages log

Return to top

To view the Java messages log

Related Topic
Running Java applets

Return to top

To use scripting

  1. On the Edit menu, click Preferences.
  2. Under Web Browser, click Web Content.
  3. Select the Enable Scripting check box. If a Web page uses JavaScript or JScript and the Scripting check box is not selected, you might be able to view the elements, but you will not be able to use them. For example, if a script is used to create a pop-up menu, you might be able to see the menu items, but nothing will happen when you select a menu item.
  4. From the Active Scripting Error Alerts menu, select the amount of information you want to see when a scripting error occurs.
  5. Select the Show Unsupported Scripting Languages Errors check box to see alerts when you display a page that uses a scripting language not supported by Internet Explorer, such as Visual Basic Scripting Edition.

Return to top

What are Internet Ratings?

The Internet provides unprecedented access to a wide variety of information. Some information, however, may not be suitable for every viewer. For example, you might want to prevent your children from seeing information with violent or sexual content.

With Internet Ratings support, Internet Explorer provides a way to help you control the types of content that your computer can access on the Internet. After you turn on Internet Ratings, only rated content that meets or exceeds your criteria can be displayed. You can adjust the settings.

Specifically, Internet Ratings support allows you to:

Internet Ratings is set to the most conservative (least likely to offend) settings when you first enable it. You can adjust these settings to match your own preferences.

Not all Internet content is rated. If you choose to allow other people to view unrated sites on your computer, some of those sites could contain inappropriate material.

Related Topics
Adjust the types of content that others can see
Screen out inappropriate content
Allow others to view restricted content
Allow others to view unrated content

Return to top

To screen out inappropriate content

  1. On the Edit menu, click Preferences.
  2. Under Web Browser, click Ratings.
  3. Click Enabled.
  4. If you have never set Internet ratings, click Change Password.
  5. Type a new password. By default, no password is provided.
  6. Confirm your new password by typing it again.
  7. Choose rating levels for violence, sex, nudity, and language.
    A description of the selected level is provided.

Tips

Return to top

To adjust the type of content others can see

  1. On the Edit menu, click Preferences.
  2. Under Web Browser, click Ratings.
  3. Click Enabled.
  4. If you have never set Internet ratings, click Change Password.
  5. Type a new password. By default, no password is provided.
  6. Confirm your new password by typing it again.
  7. Choose new rating levels for violence, sex, nudity, and language. A description of the selected level is provided.

Return to top

To allow others to view unrated content

  1. On the Edit menu, click Preferences.
  2. Under Web Browser, click Ratings.
  3. Type the supervisor password for your computer.
  4. Click the Options button.
  5. Select the User Can View Sites That Have No Rating check box.

Allowing others to view restricted content

Return to top

To allow others to view restricted content

  1. On the Edit menu, click Preferences.
  2. Under Web Browser, click Ratings.
  3. Type the supervisor password for your computer.
  4. Click the Options button.
  5. Select the Supervisor Can Type A Password to Allow User To View Sites That Have No Rating check box.

Related Topics
Allowing others to view unrated content

Return to top

To use a ratings bureau

  1. On the Edit menu, click Preferences.
  2. Under Web Browser, click Ratings.
  3. Click Options.
  4. In the Ratings Bureau box, type the address of the ratings bureau you want to use.
Note

Return to top

What are security zones?

Microsoft Internet Explorer divides the Internet into zones, so that you can assign a Web site a zone with a suitable security level.

You can tell which zone the current Web page is in by looking at the left side of the Status Bar. Whenever you attempt to open or download content from the Web, Internet Explorer checks the security setting for that Web site zone.

There are four different zones:

In addition, any files already on your local computer are assumed to be completely safe, and no security settings are applied to them. This allows you to open and run files and programs on your computer without prompting or interruption. You cannot assign a folder or drive on your computer to a security zone.

Setting up a security zone requires you to do the following:
Set a security level for each zone
Assign a Web site to a security zone

How you assign security levels and Web sites is completely up to you. The actions for each level are already defined, but you can also create custom settings for the security zone.

Generally, you would trust Web sites on an intranet the most, and would probably set your security setting to Low for that zone. Most programs could then be run or download from these sites with little or no notification.

On the other hand, Web sites in the Restricted Site zone may be these from which you want to avoid running or opening any scripts or active content.

Return to top

To set a security level for each zone

  1. On the Edit menu, click Preferences.
  2. Under Web Browser, click Security Zones.
  3. In the Zone menu, select the zone for which you want to set the security level.
  4. Select a security level.

Tip

Related Topics
Assigning a Web site to a security zone
What are security zones?

Return to top

To assign a Web site to a security zone

  1. On the Edit menu, click Preferences.
  2. Under Security, click Security zones.
  3. From the Zone menu, click the Trusted Sites zone or Restricted Sites zone.
  4. Click Add Sites.
  5. Click Add.
  6. Enter the address (URL) for the Web site, and then click OK.

Notes

Related Topics
Setting a security level for each zone
What are security zones?

Return to top