DESKTOP

Windows 7 : Protecting Your Computer While Browsing (part 4) - Restricting Permissions Using Security Zones

1/31/2011 5:09:14 PM

6. Restricting Permissions Using Security Zones

Security levels and zones are important parts of Internet Explorer’s security features. You can display security options for Internet Explorer by clicking Tools→Internet Options, and then clicking the Security tab in the Internet Options dialog box, as shown in Figure 8. The standard levels of security that you can use are:

High

Appropriate for sites that might contain harmful content. With this security level, Internet Explorer runs with maximum safeguards and with less-secure features disabled.

Medium-high

Appropriate for most public Internet sites. With this security level, Internet Explorer prompts you prior to downloading all potentially unsafe types of content and disables downloading of unsigned ActiveX controls.

Medium

Appropriate only for trusted sites. With this security level, Internet Explorer prompts you prior to downloading most potentially unsafe contents and disables downloading of unsigned ActiveX controls.

Medium-low

Appropriate only for sites on your internal network. With this security level, Internet Explorer disables downloading of unsigned ActiveX controls but downloads and runs most types of content without prompting. This option is available only for the “Local intranet” and “Trusted sites” zones.

Low

Appropriate only for sites you know are trustworthy, such as secure internal sites. With this security level, Internet Explorer uses minimal safeguards, and downloads and runs most types of content without prompts. This option is available only for the “Local intranet” and “Trusted sites” zones.

Figure 8. Managing the overall security on a per-zone basis


Internet Explorer 8 uses security zones to help you restrict permissions according to where websites are located and what you know about them. Each security zone is assigned a default security level. From most trusted to least trusted, the security zones are:

Local intranet

This zone is used to configure security settings for sites on your local network. The default security level is Medium-low.

NOTE

Unlike early releases of Windows, Windows 7 (and Vista) can automatically detect when websites are on your local network. Windows 7 does this by checking the network address of the website and comparing it to the network address of your computer. Windows 7 also considers sites bypassed by the proxy server and network paths, such as Universal Naming Convention (UNC) paths, as being on the local network.

Trusted sites

This zone is used to configure security settings for sites that you explicitly trust and that are considered to be free of content that could damage or harm your computer. The default security level is Medium.

Internet

This zone is used to configure security settings for sites on the public Internet, and is used for all sites not placed in other zones. The default security level is Medium-high.

Restricted sites

This zone is used to configure security settings for sites that could potentially damage your computer. The default security level is High.

When you are working with the “Local intranet,” “Trusted sites,” and “Restricted sites” zones, you can specify the web addresses of sites that should be associated with these zones. With the “Local intranet” zone, you can also control the way Windows 7 detects sites on the local network.

6.1. Setting the security level for a zone

One way to modify the security level for a zone is to assign a new security level. With the “Local intranet” and “Trusted sites” zones, you can assign any desired security level. With the Internet zone, the only allowed security levels are Medium, Medium-high, and High. With the Restricted zone, the only allowed security level is High. You can also enable or disable Protected Mode on a per-zone basis. Protected Mode is enabled by default for all zones except the “Trusted sites” zone.

To configure the security level for a particular zone, follow these steps:

  1. In Internet Explorer, click Tools→Internet Options. This displays the Internet Options dialog box.

  2. On the Security tab, click the zone you want to work with.

  3. To change the security level, move the “Security level for this zone” slider up or down to the desired level.

  4. To enable Protected Mode for the zone, select the Enable Protected Mode checkbox. To disable Protected Mode for the zone, clear the Enable Protected Mode checkbox. Any changes you make to the Protected Mode settings require that you restart Internet Explorer for the changes to take effect.

  5. To restore the default security settings for the selected zone, click the “Default level” button.

  6. Click OK to save your settings.

To reset security for all zones, follow these steps:

  1. In Internet Explorer, click Tools→Internet Options. This displays the Internet Options dialog box.

  2. On the Security tab, click the “Reset all zones to default level” button and then click OK to save your settings.

6.2. Setting a custom security level for a zone

In addition to being able to assign a specific security level for a zone, you can also set a custom level by configuring the individual security settings summarized in Table 1. Generally, you want to set a custom level only to resolve a specific problem you are experiencing and should otherwise rely on the predefined security levels to achieve the desired results. To resolve a problem with a specific site, you might want to consider adding it to a different zone temporarily rather than changing settings for all Internet sites. For example, you could add a site to the Trust Site zone temporarily to see if this resolves a problem.

You can configure a custom security level for a particular zone by completing these steps:

  1. In Internet Explorer, click Tools→Internet Options. This displays the Internet Options dialog box.

  2. On the Security tab, click the zone you want to work with.

  3. Click the “Custom level” button to display the Security Settings dialog box.

  4. Use the individual security settings to specify how you want to handle potentially risky actions, files, programs, and downloads. With most settings your options may include:

    Prompt

    Click Prompt to be prompted for approval before proceeding.

    Disable

    Click Disable to skip prompting and automatically refuse the action or download.

    Enable

    Click Enable to skip prompting and automatically accept the action or download.

  5. Click OK to save your settings.

Table 1. Internet Explorer security settings and their meanings
Security category/settingDescription
.NET Framework 
Loose XAMLControls the use of Extensible Application Markup Language (XAML) documents that are formatted loosely (rather than strictly) according to their Document Type Definitions (DTDs).
XAML Browser ApplicationsControls the use of XAML browser applications for viewing XAML documents within Internet Explorer.
XPS DocumentsControls the use of XML Paper Specification (XPS) formatted documents.
.NET Framework-reliant components
Permissions for components with manifestsControls how .NET Framework components with manifests are used. They are either disabled completely or run in High Safety mode.
Run components not signed with AuthenticodeControls the use of .NET Framework components that are not digitally signed.
Run components signed with AuthenticodeControls the use of .NET Framework components that are digitally signed.
ActiveX controls and plug-ins
Allow previously unused ActiveX controls to run without promptControls whether new ActiveX controls can run without first prompting for permission.
Allow scriptletsControls the use of scriptlets in web pages.
Automatic prompting for ActiveX controlsControls whether you are automatically prompted each time before using ActiveX controls.
Binary and script behaviorsControls the direct execution of binary executables and scripts, such as when you click links to an executable or script.
Display video and animation on a web page that does not use external media playerControls whether embedded video and animation play in Internet Explorer.
Download signed ActiveX controlsControls the downloading of signed ActiveX controls.
Download unsigned ActiveX controlsControls the downloading of unsigned ActiveX controls.
Initialize and script ActiveX controls not marked as safe for scriptingControls whether ActiveX controls not marked as safe for scripting can be modified or scripted based on the contents of a web page.
Only allow approved domains to use ActiveX without promptControls whether installed ActiveX controls can run on a domain other than the one you installed it from.
Run ActiveX controls and plug-insControls whether ActiveX controls and browser plug-ins run in Internet Explorer.
Script ActiveX controls marked for safe scriptingControls whether ActiveX controls marked for safe scripting can be modified or scripted based on the contents of a web page. If you change this setting, you must restart Internet Explorer for the change to be applied.
Downloads
Automatic prompting for file downloadsControls whether Internet Explorer prompts you for file downloads.
File downloadControls whether Internet Explorer downloads files.
Font downloadControls whether Internet Explorer downloads fonts.
Enable .NET Framework setup
Enable .NET Framework setupControls whether .NET Framework setup is launched when you visit a site that contains .NET content.
Miscellaneous
Access data sources across domainsControls whether scripts and other elements in a page can access data sources from other domains.
Allow META refreshControls whether automatic refresh or redirection of a page is allowed using the HTML META tag.
Allow scripting of Microsoft web browser controlControls whether a web page can script the browser control directly.
Allow script-initiated windows without size or position constraintsControls whether a script in a web page can open a window without size or position details.
Allow web pages to use restricted protocols for active contentControls whether a web page can use restricted protocols with scripts and other types of active content.
Allow websites to open windows without Address or Status barControls whether a script in a web page can open a window without an Address or Status bar.
Display mixed contentControls whether a web page can display content from both secure and unsecure sources.
Don’t prompt for client certificate selection when no certificates or only one certificate existsControls whether Internet Explorer prompts you to select a client certificate when there is only one or no certificate available.
Drag and drop or copy and paste filesControls whether Internet Explorer allows you to use drag and drop or copy and paste with web pages.
Include local directory path when uploading to a serverControls whether Internet Explorer includes the full local directory path when you upload files to a remote server.
Installation of desktop itemsControls whether Internet Explorer allows items to be installed on the desktop.
Launching applications and unsafe filesControls whether Internet Explorer allows other applications to be started and whether it allows unsafe files to be opened.
Launching programs and files in an IFRAMEControls whether Internet Explorer allows other applications and files to be opened in an IFRAME.
Navigate windows and frames across different domainsControls whether Internet Explorer allows windows and frames to come from multiple domains.
Open files based on content, not file extensionControls whether Internet Explorer opens files based on the Multipurpose Internet Mail Extension (MIME) type or based on the file extension.
Submit nonencrypted form dataControls whether Internet Explorer can submit nonencrypted (plain-text) form data to a website.
Use Pop-up BlockerControls whether the Pop-up Blocker is enabled or disabled.
Use SmartScreen FilterControls whether the phishing filter is enabled or disabled.
User data persistenceControls whether user data such as browsing history is included in a web page that has been saved to disk.
Websites in less privileged content zone can navigate into this zoneControls whether websites in a zone with a lower security level can redirect to websites in a zone with a higher security level.
Scripting
Active scriptingControls whether Active scripting of web pages is allowed.
Allow programmatic clipboard accessControls whether a script or other element in a web page can read what is copied to your computer’s clipboard.
Allow Status bar updates via scriptControls whether a script or other element in a web page can update the Status bar.
Allow websites to prompt for information using scripted windowsControls whether a script or other element in a web page can display a prompt.
Enable XSS filterControls whether cross-site scripting filtering is enabled. When enabled the filter tries to limit cross-site scripting attacks which occur when a website adds JavaScript to otherwise legitimate requests to another website, often in an attempt to gain access to privileged information.
Scripting of Java appletsControls whether a script or other element in a web page can script Java applets.
User authentication
LogonControls the way user authentication works when you need to log on to a website. The options are Anonymous Logon, Automatic Logon Only in Intranet Zone, Automatic Logon with Current User Name and Password, and Prompt for User Name and Password.

6.3. Configuring local intranet detection and sites

Windows 7 automatically detects sites on the local network according to their network address. If you experience problems with sites not being detected properly, you may want to disable automatic detection settings and allow only specifically included types of sites to be considered local sites. In addition to or instead of doing this, you can specifically identify a site as being on the local network.

Figure 9. Configuring the way local network sites are used


To configure local intranet detection, specify local sites, or both, complete the following steps:

  1. In Internet Explorer, click Tools→Internet Options. This displays the Internet Options dialog box.

  2. On the Security tab, click the “Local intranet” zone and then click the Sites button. This displays the “Local intranet” dialog box, as shown in Figure 7-22.

  3. If Windows 7 is unable to detect sites on the local network automatically, you may need to manually configure the intranet zone settings. To do this, clear “Automatically detect intranet network” and then specify sites to include. You can include local (intranet) sites not listed in other zones, sites that bypass the proxy server, and network paths (UNCs) by selecting the related checkboxes. To exclude a type of resource, clear the related checkbox.

  4. To specify additional sites for the “Local intranet” zone or require secure verification using Hypertext Transfer Protocol Secure (HTTPS) for all sites in the “Local intranet” zone, click the Advanced button. This displays a new “Local intranet” dialog box with the following options:

    Add

    To add a site to the “Local intranet” zone, type the web address for a site, then click Add.

    Remove

    To remove a site from the “Local intranet” zone, click the web address, then click Remove.

    Require server verification (https:) for all sites in this zone

    To require secure verification for all sites in this zone using HTTPS, select this checkbox.

  5. Click OK twice.

6.4. Configuring trusted sites

If you find that the normal security settings are too restrictive for a site that you explicitly trust and know to be free of content that could damage your computer, you can designate the site as a trusted site by completing these steps:

  1. In Internet Explorer, click Tools→Internet Options. This displays the Internet Options dialog box.

  2. On the Security tab, click the “Trusted sites” zone and then click the Sites button. This displays the “Trusted sites” dialog box, as shown in Figure 10.

  3. To add a site to the “Trusted sites” zone, type the web address for the site and then click Add.

  4. To remove a site from the “Trusted sites” zone, click the web address and then click Remove.

  5. To require secure verification for all sites in this zone using HTTPS, select the “Require server verification (https:) for all sites in this zone” checkbox.

  6. Click OK to save your settings.

Figure 10. Configuring trusted sites and related options


6.5. Configuring restricted sites

If you find a site that has offensive content or content that could damage your computer, you can designate the site as a restricted site by completing the following steps:

  1. In Internet Explorer, click Tools→Internet Options. This displays the Internet Options dialog box.

  2. On the Security tab, click the “Restricted sites” zone and then click the Sites button. This displays the “Restricted sites” dialog box, as shown in Figure 11.

  3. To add a site to the “Restricted sites” zone, type the web address for the site, then click Add.

  4. To remove a site from the “Restricted sites” zone, click the web address, then click Remove.

  5. Click OK to save your settings.

Figure 11. Configuring restricted sites


NOTE

Keep in mind that designating a site as a restricted site doesn’t stop you or anyone else from accessing the site. Instead, it establishes a higher level of security for the site.

Other  
  •  Windows Server 2008 : Understanding Active Directory Sites (part 2)
  •  Windows Server 2008 : Understanding Active Directory Sites (part 1)
  •  Windows Server 2008 : Understanding AD DS Replication in Depth
  •  Programming Excel with VBA and .NET : Knowing the Basics - Classes and Modules
  •  Windows 7 : Indexing Your Computer for Faster Searches (part 3) - Optimizing File Properties for Indexing
  •  Windows 7 : Indexing Your Computer for Faster Searches (part 2) - Specifying Files Types to Include or Exclude
  •  Windows 7 : Indexing Your Computer for Faster Searches (part 1) - Adding or Removing Indexed Locations
  •  Windows Server 2008 : Designing Organizational Unit and Group Structure - Exploring Sample Design Models
  •  Windows Server 2008 : Designing Organizational Unit and Group Structure - Understanding Group Design
  •  Windows Server 2008 : Designing Organizational Unit and Group Structure - Group Policies and OU Design
  •  
    Most View
    Join The 3D Revolution (Part 1)
    SQL Server 2005 : Advanced OLAP - Perspectives
    How To Unsend A Direct Message On Twitter
    Gigabyte G1.Sniper M5 2013
    Samsung ES8000 – The Most Powerful Smart TV
    Programming WCF Services : Security - Transfer Security
    Adobe Creative Suite 6 Software Reviews
    Buying From Itunes (Part 2) - Importing into iTunes, Copy protection
    Dali Mentor Minuet – Hitting The Big Time (Part 2)
    Doubling Up On Drivers KEF M200
    Top 10
    Sharepoint 2013 : Building a BCS-enabled Business Solution : Building an Integrated BCS Solution with an App for SharePoint Containing an App for Office
    Business Connectivity Services in Apps for SharePoint 2013 : Building an App-level BCS Solution for Office 365 SharePoint Online
    Business Connectivity Services in SharePoint 2013 : Adding a Business Data Connectivity Model to Office 365 SharePoint Online
    Remote Event Receivers in Sharepoint 2013 : Introducing Remote Event Receivers
    Windows Server 2008 and Windows Vista : Common GPO Troubleshooting Tools (part 3) - GPResult, GPOTool
    Windows Server 2008 and Windows Vista : Common GPO Troubleshooting Tools (part 2) - GPMC
    Windows Server 2008 and Windows Vista : Common GPO Troubleshooting Tools (part 1) - GPLogView
    Windows Server 2008 and Windows Vista : Using Event Logging for Troubleshooting (part 4) - Summary of Group Policy Event IDs
    Windows Server 2008 and Windows Vista : Using Event Logging for Troubleshooting (part 3) - Divide the Custom View of the Log into Three Phases
    Windows Server 2008 and Windows Vista : Using Event Logging for Troubleshooting (part 2)