Chapter 12. Managing Microsoft Internet Explorer Security and Privacy

In this chapter: 
Security Settings in Internet Explorer273
Best Practices296
Additional Information296

Most organizations that use Microsoft operating systems also use Microsoft Internet Explorer. In fact, browsing the Internet has become a mission-critical business activity; however, it also can provide attackers a direct avenue into the corporate network, bypassing traditional perimeter security mechanisms, such as firewall rules. Consequently, when securing computers running Microsoft Windows Server 2003, Windows 2000, and Windows XP on your network, you should also consider how you will secure Internet Explorer. Even if your organization does not use Internet Explorer as ...

Get Microsoft® Windows® Security Resource Kit, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.