IE7 Security Guide and other resources

Friday, August 17, 2007 7:20 AM   There have been several requests for good IE resources – especially resources pertaining to Internet Explorer 7.  The majority of these requests are in reference to three areas – Security, Deployment and Developing for IE7.  Bearing in mind that the folks on the Performance team are not hardcore…


Overview of Internet Explorer Group Policies

Friday, July 06, 2007 4:59 AM Today we’re going to discuss IE Group Policies.  If you’re unfamiliar with Group Policies, I highly recommend that you read our earlier post on the Basics of Group Policies.  When dealing with IE group policies, there are two types of settings to consider – IE Maintenance and IE Administrative…

2

Understanding the IE User Agent String

Friday, May 11, 2007 5:12 AM Today we’re going to discuss the IE User-Agent String – a term with which more administrators are becoming familiar since the launch of IE7.  The User-Agent string identifies your browser to the server hosting the site that you are visiting.  This allows the web server to provide content that…


Application Compatibility – IE7 Protected Mode

Friday, April 20, 2007 4:44 AM On Windows Vista, Internet Explorer 7 runs in Protected Mode, which can help protect users from attack by running the Internet Explorer process with greatly restricted privileges.  Protected Mode significantly reduces the ability of an attack to write, alter, or destroy data on the user’s machine or to install…


IE7 – Tabbed Browsing

Friday, March 30, 2007 6:46 AM Tabbed browsing is a new feature in Internet Explorer 7.  One question we are frequently asked by administrators is – “How do I control the tab behavior for my users to present a consistent experience?”  We are also asked the same thing by developers who want to leverage this…


IE7 – Introducing the Phishing Filter

Friday, March 16, 2007 9:37 AM   Before looking at the new Phishing Filter for IE7 and what it does, it is important to understand what Phishing is, and some common Phishing techniques. Phishing is a criminal activity.  Using social engineering techniques, phishers attempt to fraudulently acquire sensitive information – such as usernames, passwords, credit…


Blocking Internet Explorer 7 Installations

                                                                                   Wednesday, January 10, 2007 12:21 PM One of the more common questions IT Admins and Managers ask us when they call in is “How do we prevent IE7 from installing on our client machines?”  Although it seems like a fairly straightforward question there are several scenarios to consider: Scenario 1: If a user gets the update…