Businesses need complete control over their users' Web browsing
abilities, and Internet Explorer provides an extreme amount of
flexibility. For example, administrators can use Group Policy settings
to turn off tabbed browsing, allow pop-ups, turn off suggestions,
restrict search providers, or turn off the Favorites bar.
If a user complains that an Internet Explorer feature is not
working correctly, you should determine whether Group Policy restrictions might be responsible. You can
use the Resultant Set Of Policy tool to determine which settings have
been defined for a user or computer, and which Group Policy objects
are responsible. To use the Resultant Set Of Policy tool, perform
these steps:
-
Click Start, type rsop.msc,
and press Enter. -
In the Resultant Set Of Policy window, within both the
Computer Configuration or User Configuration, select the
Administrative Templates\Windows Components\Internet Explorer
node. -
As shown in Figure 1 the Details
pane shows Internet Explorer settings that have been defined, and
which GPO defined them.
Practice: Troubleshoot Certificate Problems
In this practice, you configure the ActiveX Installer Service
to trust ActiveX controls from MSN. Then, you troubleshoot
certificate-related problems by generating an untrusted certificate,
viewing how Internet Explorer responds to that certificate, and then
configuring Internet Explorer to trust the certificate.
EXERCISE 1 Simulate an Invalid
Certificate
In this exercise, you open a Web page using a host name other
than the common name specified in the SSL certificate and view how
Internet Explorer handles it.
-
Open Internet Explorer. In the Address bar, type www.microsoft.com. Press
Enter.
Internet Explorer opens the www.microsoft.com home
page using encrypted HTTPS. Note the gold lock in the Address
bar, as shown in Figure 2. -
Click the gold lock in the address bar to display the Web
site identification. Notice that the identification page
displays "www.microsoft.com," which
exactly matches the host name you typed in the address
bar. -
In the Address bar, type https://microsoft.com. Notice that this
time the host name does not begin with "www." Press
Enter.
Internet Explorer displays the There Is A Problem With
This Website's Security Certificate Web page. This happens
because the host name in the certificate, www.microsoft.com, does
not exactly match the host name you typed in the address bar,
microsoft.com.
Users would see this same error message if they attempted to
visit a site that was impersonating another site.
EXERCISE 2 Issue an Untrusted
Certificate
In this exercise, you must issue an internal certificate to a
Web server and determine how Windows 7 handles it both as a member
of the domain and from outside the domain.
-
Connect to a Windows Server 2008 R2 AD DS domain
controller in a test environment, and log on as an
administrator. -
Click Start, click Administrative Tools, and then click
Server Manager. -
In Server Manager, click the Roles node, and then click
Add Roles. -
On the Before You Begin page, click Next. -
On the Select Server Roles page, select Active Directory
Certificate Services, and then click Next. -
On the Introduction To Active Directory Certificate
Services page, click Next. -
On the Select Role Services page, select Certification Authority, Certification Authority
Web Enrollment, and Online Responder. When prompted to add other
services, click Add Required Role Services. Click Next. -
On the Specify Setup Type page, click Enterprise. Click
Next. -
On the Specify CA Type page, leave Root CA selected, and
then click Next. -
On the Set Up Private Key page, leave Create A New Private
Key selected. Click Next. -
On the Configure Cryptography For CA page, click
Next. -
On the Configure CA Name page, type the host name for your
CA (such as DCSRV1.nwtraders.msft) and then click Next. -
On the Set Validity Period page, click Next. -
On the Configure Certificate Database page, click
Next. -
On the Web Server page, click Next. -
On the Role Services page, click Next. -
On the Confirmation page, click Install. -
Click Close, and click Yes to restart the computer. -
After the computer restarts, log on again. Allow Server
Manager to finish completing the installation of the server
roles, and then click Close. -
Click Start, click Administrative Tools, and then click
Internet Information Services (IIS) Manager. -
In the Internet Information Services (IIS) Manager, click
your computer. -
Double-click Server Certificates. -
In the Actions pane, click Create Domain
Certificate. -
On the Distinguished Name Properties page, type the full
host name in the Common Name box, such as dc1.nwtraders.msft. Type Northwind Traders in the Organization box
and type IT in the Organizational
Unit box. In the City, State, and Country boxes, provide your
local information. Then, click Next. -
On the Online Certification Authority page, click Select. Select
the domain controller, and then click OK. In the Friendly Name
box, type DC1. Click Finish. -
In the Internet Information Services (IIS) Manager, expand
Sites and then click Default Web Site. Right-click Default Web
Site and then click Edit Bindings. -
In the Site Bindings dialog box, click Add. -
In the Add Site Binding dialog box, click the Type list
and then select HTTPS. In the SSL Certificate list, select
dc1.nwtraders.msft. Click OK, and then click Close. -
Now you have configured your domain controller as a Web
server with an SSL certificate. Open Internet Explorer. In the
address bar, enter https://common_name, where
common_name is the name you entered in the
certificate, such as dc1.nwtraders.msft. Press Enter.
Internet Explorer opens the page. Notice that the gold
lock icon appears in the address bar, signifying that the SSL
certificate is valid. -
On a second computer running Windows 7 that is not a
member of your domain, open Internet Explorer. Alternatively, if
you do not have a second computer, you can remove your computer
running Windows 7 from the domain temporarily. In Internet
Explorer, enter https://common_name and press Enter.
Internet Explorer displays a warning message indicating
that the certificate was not issued by a trusted CA, as shown in
Figure 3.
Now, continue to Exercise 3 to resolve this problem.
EXERCISE 3 Trust a Certificate
Authority
In this exercise, you must export your CA's root certificate
and trust that certificate on your nondomain computer running
Windows 7 so that you can open the SSL-encrypted Web site without a
warning. To complete this exercise, you must have completed Exercise
2.
-
On your domain controller, in the Certification Authority console, right-click your
server and then click Properties. -
Click the General tab. Click Certificate #0, and then
click View Certificate. -
In the Certificate dialog box, click the Details tab.
Then, click Copy To File. -
The Certificate Export Wizard appears. Click Next. -
On the Export File Format page, accept the default export
format, and then click Next. -
On the File To Export tab, type C:\root.cer and then click Next. -
Click Finish, and then click OK three times. -
On your client computer running Windows 7 that is not a
member of your test domain, open Internet Explorer. In Internet
Explorer, click the Tools button on the toolbar, and then click
Internet Options. -
In the Internet Options dialog box, click the Content tab
and then click Certificates. -
In the Certificates dialog box, click the Trusted Root
Certification Authorities tab and then click
Import. -
The Certificate Import Wizard appears. On the Welcome To
The Certificate Import Wizard page, click Next. -
On the File To Import page, click Browse. In the Open
dialog box, type \\server_name\c$\root.cer. Then click Open and click
Next. -
On the Certificate Store page, notice that the Certificate
Import Wizard imports the certificate into the Trusted Root
Certification Authorities store by default. This is the correct
place. Click Next. -
On the Completing The Certificate Import Wizard page,
click Finish. -
A Security Warning dialog box appears. Click Yes to
install the certificate and then click OK. -
Click Close and then click OK. -
In Internet Explorer, enter https://common_name and press Enter.
Internet Explorer opens the page. Notice that the gold
lock icon appears in the address bar, signifying that the SSL
certificate is valid. Because this computer is not a member of
the AD DS domain, you had to trust the root certificate
manually. Then, all certificates issued by that CA will be
trusted. If the computer had been a member of the AD DS domain,
Group Policy would have caused the computer to trust the
enterprise CA automatically.
|