DESKTOP

Windows 7 : Configuring and Troubleshooting Internet Explorer Security - Internet Explorer Add-Ons (part 1)

1/4/2014 2:55:24 AM

Add-ons extend Internet Explorer capabilities to enable Web sites to provide much richer, more interactive content. For example, the following are commonly used add-ons:

  • Shockwave Flash An add-on that enables complex animations, games, and other interactive capabilities

  • Windows Media Player An add-on that enables Web pages to integrate audio and video

  • Microsoft Virtual Server VMRC Control An add-on that enables users to remotely control a remote virtual machine from within Internet Explorer

The sections that follow describe how to configure add-ons and troubleshoot problems related to add-ons.

1. How to Enable and Disable Add-Ons

After starting Internet Explorer, you can disable or delete add-ons by following these steps:

  1. Click the Tools button on the toolbar, and then click Manage Add-Ons.

    The Manage Add-Ons dialog box appears, as shown in Figure 1.

    The Manage Add-Ons dialog box

    Figure 1. The Manage Add-Ons dialog box

  2. In the Manage Add-Ons dialog box, select an add-on, and then click Disable to prevent the add-on from automatically loading. If the add-on is an ActiveX control, you can click Delete to permanently remove it.

If an add-on is causing serious enough problems that you can't start Internet Explorer, you can disable the add-on without opening Internet Explorer by following these steps:

  1. Click Start, and then click Control Panel.

  2. Click the Network And Internet link.

  3. Under Internet Options, click the Manage Browser Add-Ons link.

    The Internet Properties dialog box appears.

  4. Click Manage Add-Ons.

  5. In the Manage Add-Ons dialog box, select an add-on, and then click Disable to prevent the add-on from automatically loading.

2. How to Start Internet Explorer without Add-Ons

A buggy or malicious add-on can cause problems with starting Internet Explorer. To work around this problem and launch Internet Explorer without add-ons, follow these steps:

  1. Click Start. Then, click All Programs, Accessories, and System Tools.

  2. Click Internet Explorer (No Add-Ons).

    Internet Explorer starts with all add-ons disabled. If a Web page opens a new window when you click a link, that new window also has add-ons disabled. Add-ons will be enabled automatically the next time you start Internet Explorer using the standard shortcut.

Alternatively, you can start Internet Explorer manually using the -extoff parameter by clicking Start, typing iexplore -extoff, and pressing Enter.

3. How to Configure Add-Ons in AD DS Domain Environments

As with earlier versions of Internet Explorer, you can use the Group Policy settings in User Configuration\Policies\Administrative Templates\Windows Components\Internet Explorer\Security Features\Add-on Management to enable or disable specific add-ons throughout your organization. Typically, you need to use two settings in this group to block all unapproved add-ons in your organization:

  • Add-On List Enable this setting, and then specify the approved add-ons in your organization. To specify an add-on, provide the class identifier (CLSID) for the add-on you need to add as the Value Name in the Add-On List. The CLSID should be in brackets, such as "{BDB57FF2-79B9-4205-9444-F5FE85F37312}." You can find the CLSID for an add-on by reading the <object> tag from the HTML of a Web page that references the add-on. To specify that the add-on should be denied, specify a value of 0. To allow an add-on, specify a value of 1. To both allow an add-on and permit users to manage the add-on, specify a value of 2.

  • Deny All Add-Ons Unless Specifically Allowed In The Add-On List After specifying the add-ons you want to allow in the Add-On List setting, enable this policy to block all other add-ons automatically. You can use the combination of these two settings to block all unapproved add-ons.

Two other Group Policy settings related to add-on management are located within both User Configuration and Computer Configuration at Administrative Templates\Windows Components\Internet Explorer. The settings that relate to managing add-ons are:

  • Turn Off Crash Detection By default, Internet Explorer detects an add-on that crashes and disables it the next time you start Internet Explorer. If you have a problematic add-on that is required for a critical Web application, you can enable this policy to ensure that even a failing add-on continues to run.

  • Do Not Allow Users To Enable Or Disable Add-Ons By default, users can open the Manage Add-Ons dialog box and enable or disable add-ons. If you enable this policy, they won't be able to configure add-ons.

Other  
  •  Windows Server 2008 : Using ntdsutil - Seizing an Operations Master Role
  •  Windows Server 2008 : Using ntdsutil - Performing an Authoritative Restore, Removing a Domain Controller from Active Directory
  •  Windows Server 2008 : Using ntdsutil - Moving Active Directory to a Different Drive, Defragmenting Active Directory
  •  Windows Server 2008 : Using ntdsutil - Resetting the Directory Services Restore Mode Password, Changing the Garbage Collection Logging Level
  •  Windows Server 2003 : Deploying Stub Zones - Benefits of Stub Zones, Stub Zone Updates
  •  Windows Server 2003 : Creating Zone Delegations - Delegating Zones
  •  Windows Server 2003 : Configuring Advanced DNS Server Properties (part 2)
  •  Windows Server 2003 : Configuring Advanced DNS Server Properties (part 1)
  •  Windows 7 : Working with the Multi-Touch User Interface (part 3) - Adding Multi-Touch Interface Functionality
  •  Windows 7 : Working with the Multi-Touch User Interface (part 2) - Obtaining the Multi-Touch Platform Interop Library, Configuring the Application
  •  
    Most View
    Master Apple Mail (Part 2)
    Windows Small Business Server 2011 : Installing the Second Server (part 1) - Installation and Initial Configuration - Installation
    ARM’s Big Little At Large (Part 1)
    Nokia Lumia 920 - Windows Phone 8 And Magic Camera (Part 2)
    SFF Media PCs: What Hardware To Consider, And What To Ignore (Part 2)
    Why Would You Buy A Tablet? (Part 1)
    Group Test: Sub-8in Tablets (Part 1) : Acer Iconia Tab A110, Amazon Kindle Fire HD
    Html 5 : Text Tags and a Little CSS3 - The Fundamentals
    Why Should You Care About Gnome OS?
    Building Applications with Visual Studio 2010 : Getting Smart about Smart Clients - Manipulating Controls
    REVIEW
    - First look: Apple Watch

    - 3 Tips for Maintaining Your Cell Phone Battery (part 1)

    - 3 Tips for Maintaining Your Cell Phone Battery (part 2)
    VIDEO TUTORIAL
    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
    Popular Tags
    Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS
    Top 10
    3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
    3 Tips for Maintaining Your Cell Phone Battery (part 1) - Charge Smart
    OPEL MERIVA : Making a grand entrance
    FORD MONDEO 2.0 ECOBOOST : Modern Mondeo
    BMW 650i COUPE : Sexy retooling of BMW's 6-series
    BMW 120d; M135i - Finely tuned
    PHP Tutorials : Storing Images in MySQL with PHP (part 2) - Creating the HTML, Inserting the Image into MySQL
    PHP Tutorials : Storing Images in MySQL with PHP (part 1) - Why store binary files in MySQL using PHP?
    Java Tutorials : Nested For Loop (part 2) - Program to create a Two-Dimensional Array
    Java Tutorials : Nested For Loop (part 1)