Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
programming4us
Windows 7

Administering Internet Explorer : Understanding Advanced Settings (part 1) - Certificate Settings

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
6/19/2011 4:08:48 PM
Internet Explorer includes several advanced settings that you can manipulate to control how IE functions. These settings are located in the Advanced tab of the Internet Options screen.

The Security category is the most important section on the Advanced tab. Figure 1 shows the Advanced tab with the Security section showing.

Figure 1. IE Advanced settings

Several categories of settings exist on the Advanced tab:

Accessibility

These settings can be manipulated to make the web pages user friendly for people with disabilities.

Browsing

These settings can be modified to affect how pages are displayed. This category also includes settings for some new features such as Suggested Sites and the Accelerator button.

HTTP 1.1 Settings

These setting are used to indicate that HTTP 1.1 will be used over HTTP 1.0. HTTP 1.1 was widely adopted in 1996.

International

These settings allow you to manipulate how internationalized domain names (IDNs) are used. IDNs can be used to support different character sets. You can also use the Unicode Transformation Format - 8 (UTF-8) display set.

Multimedia

These settings allow you to manipulate how multimedia elements such as pictures, animations, and sounds are treated. You can enable or disable any of the elements.

Printing

Only a single setting is included here. It allows you to choose to print background colors and images.

Search From The Address Bar

This controls what information is sent to the search provider and how the results are displayed.

Security

This is the one of the most important sections from an enterprise administrator's perspective. You can control many of the important security settings from this screen. Several of these settings are explored in more depth in the following sections.

1. Certificate Settings

The Security tab includes several settings related to certificates. Before covering these settings, it's worthwhile understanding how certificates are used with IE.

Certificates are used on the Internet to establish secure sessions using HTTPS. Consider Figure 2. A client starts an HTTPS session by clicking a link. The web server then returns a certificate that includes a public key. The public key is matched to a private key on the web server. The client and the web server use the public/private keys to establish a secure SSL session.

Figure 2. IE receiving and verifying a certificate

However, there's more to the story. The client makes several checks to ensure that the certificate passed from the web server is to be trusted.

The first check ensures that the certificate that was sent matches the server that sent it. Certificates are issued to specific servers. If someone tries to use the certificate on another server, this check will fail and the user will see an error.

The next check ensures that the certificate from the web server was issued from a CA in the Trusted Root Certification Authorities store. Most e-commerce websites purchase certificates from well-known CAs. These CAs have agreements with Microsoft to place the certificates in the Trusted Root Certification Authorities store.

You can view the Trusted Root Certification Authorities store by clicking Tools => Internet Options, selecting the Content tab, clicking Certificates, and selecting Trusted Root Certification Authorities store. If the web server purchased a certificate from one of these CAs, the check will not return an error.

On the other hand, if the web server uses a certificate that was created from a CA that is not in the Trusted Root Certification Authorities store, the user will see an error. The error indicates that the certificate is not trusted and encourages the user to not continue.

The second check is to ensure that the certificate is still valid. Certificates expire, but sometimes the certificate becomes compromised and the CA will revoke it. Every certificate has a serial number, and this serial number uniquely identifies it. When a CA revokes a certificate, it publishes the serial number on a Certificate Revocation List (CRL, pronounced "crill").

There are two ways a certificate is checked to see if it's been revoked:

Check the CRL

The client can request a copy of the CRL. The client then checks to see if the serial number of the certificate is on the CRL. If it is, it's been revoked and the client receives an error encouraging the client not to use it.

Use OCSP

The Online Certificate Status Protocol (OCSP) can also be used to check the certificate. The client uses OCSP to send the serial number of the certificate to the CA. The CA then answers by indicating the certificate is healthy, not healthy (revoked), or unknown (indicating it's an invalid serial number).

There are two ways to verify that you have a secure connection. HTTPS (instead of just HTTP) shows in the address bar, and a lock icon appears at the end of the address bar.

You can view the web server's certificate anytime you have established a secure connection using one of two methods. Figure 3 shows what appears if you click the lock icon. You can click the View Certificates link to view the certificate.

Figure 3. Viewing website information in IE

If the certificate isn't valid, the Website Identification section will appear with a warning, and the address bar will have a red background.


You can also select Page => Properties and click the Certificates button. Whether you click the Certificates button from the Page Properties screen or click the View Certificates link from the lock icon, you'll see the same certificate details as shown in Figure 4.

Figure 4. Viewing certificate details in IE

With this background information, the certificate-related settings in the Advanced tab are easier to explain. The following certificate settings are available:

Check For Publisher's Certificate Revocation

When this is checked, the CA's certificate is examined to see if it has been revoked. This setting is checked by default.

Check For Server Certificate Revocation

When this is checked, IE examines the certificate from the web server to see if it has been revoked. This setting is checked by default.

Use SSL 2.0 and Use SSL 3.0

SSL is used to establish HTTPS sessions. Both SSL 2.0 and SSL 3.0 are supported in IE 8. This setting is checked by default.

Warn About Certificate Mismatch

If the certificate presented by the server doesn't match the server, this setting will ensure that an error is presented to the user. This sometimes occurs when the website operator changes the name of the server. This setting is checked by default.

Check For Signatures On Downloaded Programs

When this is checked, IE checks signatures for any programs that have been downloaded. This setting is checked by default.

Allow Software To Run Or Install Even If The Signature Is Invalid

When this is unchecked, software with invalid signatures will not be installed. This is useful because malware will either not be signed or not have a valid signature. This setting is not checked by default.

2. Active Content

The Security tab includes two settings related to active content. Active content is content that includes scripts or ActiveX controls. Although active content can be useful, it can also contain malware.

By default, the following two settings are unchecked. This prevents active content from running from within IE.

  • Allow Active Content From CDs To Run On My Computer

  • Allow Active Content To Run In Files On My Computer

Other -----------------
- Administering Internet Explorer : Managing Windows Internet Explorer Settings (part 2)
- Administering Internet Explorer : Managing Windows Internet Explorer Settings (part 1) - Managing Cache
- Visual Basic 2010 : Reflection - Understanding Assemblies Metadata & Getting Assembly Information
- Visual Basic 2010 : Hosting WCF Services in Internet Information Services & Configuring Services with the Configuration Editor
- Supporting Mobile Windows 7 Users : Understanding DirectAccess & Using BranchCache
- Microsoft Excel 2010 - Creating and Modifying Charts - Changing Chart Titles
- Microsoft Excel 2010 - Creating and Modifying Charts - Changing Chart Gridlines and Axes
- Microsoft PowerPoint 2010 : Working Together on Office Documents - Working with SharePoint Workspaces
- Microsoft PowerPoint 2010 : Working Together on Office Documents - Collaborating with Documents on Windows Live
- Microsoft Visio 2010 : Starting a New Diagram from a Sample Diagram
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server