<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd">
<HTML DIR="LTR">
<HEAD>

<META name="MS.LOCALE" content="EN-US">
<META http-equiv="Content-Type" content="text/html; charset=Windows-1252">
<META HTTP-EQUIV="MSThemeCompatible" CONTENT="Yes">

<TITLE>Internet Explorer Enhanced Security Configuration</TITLE>

<LINK REL="stylesheet" MEDIA="screen" TYPE="text/css" HREF="coUA.css">
<LINK REL="stylesheet" MEDIA="print" TYPE="text/css" HREF="coUAprint.css">

</HEAD>
<BODY>

<H1 id=Heading1><A name="overview">Internet Explorer Enhanced Security Configuration</A></H1>

<P id=Text1>Internet Explorer Enhanced Security Configuration places your server and Microsoft Internet Explorer in a configuration that decreases the exposure of your server to potential attacks that can occur through Web content and application scripts. As a result, some Web sites may not display or perform as expected.</P> 

<P id=Text4>For more information, see the following:</P>

<UL>
	<LI id=List2_4><A href="#zones">Internet Explorer Security Zones</A></LI>
	<LI id=List2_5><A href="#howto">How to browse when Internet Explorer Enhanced Security Configuration is enabled</A></LI>
	<LI id=List2_1><A href="#effects">Effects of Internet Explorer Enhanced Security Configuration</A>
	<UL>
		<LI id=List22_1><A HREF="#termserv">Internet Explorer Enhanced Security Configuration and terminal servers</a></LI>
		<LI id=List22_2><A href="#userex">Effects of Internet Explorer Enhanced Security Configuration on the Internet Explorer user experience</a></LI></UL></LI>
	<LI id=List2_2><A href="#manage">Managing Internet Explorer Enhanced Security Configuration</A>
	<UL>
		<LI id=List23_1><A href="#addinternetsites">Add sites to the Trusted sites zone</A></LI>
		<LI id=List23_2><A href="#addintranetsites">Add sites to the Local intranet zone</A></LI>
		<LI id=List23_3><A href="#applytospecificusers">Apply Internet Explorer Enhanced Security Configuration to specific users</A></LI>
		<LI id=List23_4><A href="#W2k_default">Apply Windows&nbsp;2000 default Internet Explorer security settings</a></LI>
		<LI id=List23_5><A href="#strengthen">Strengthen Internet Explorer security settings manually on your server</a></LI></UL></LI>
	<LI id=List2_3><A href="#bestpractices">Browser Security - Best Practices</A></LI>
</UL>

<BR><HR>

<H2 id=Heading12><A name="zones">Internet Explorer Security Zones</A></H2>

<P id=Text2>In Internet Explorer, you can configure security settings for several built-in security zones: the Internet zone, the Local intranet zone, the Trusted sites zone, and the Restricted sites zone. Internet Explorer Enhanced Security Configuration assigns security levels to these zones as follows:</P>

<UL>
	<LI id=List1_1>For the Internet zone, the security level is set to High.</LI>
	<LI id=List1_2>For the Trusted sites zone, the security level is set to Medium, which allows browsing of many Internet sites.</LI>
	<LI id=List1_3>For the Local intranet zone, the security level is set to Medium-Low, which allows your user credentials (name and password) to be passed automatically to sites and applications that need them.</LI>
	<LI id=List1_4>For the Restricted sites zone, the security level is set to High.</LI>
	<LI id=List1_5>All Internet and intranet sites are assigned to the Internet zone by default. Intranet sites are not part of the Local intranet zone unless you explicitly add them to this zone.</LI>
</UL> 

<P id=ReturnToTop4><A href="#top">Return to top</A></P>

<BR><HR>

<H2 id=Heading5><A name="howto">How to browse when Internet Explorer Enhanced Security Configuration is enabled</A></H2>

<P id=Text25>The enhanced security configuration increases the level of security on your server, but may also affect Internet browsing in the following ways:</P>
<UL>
<LI id=List21_1>Because ActiveX controls and scripting are disabled, Internet sites may not display in Internet Explorer as expected and applications that make use of the Internet may not work correctly. If you trust an Internet site and need it to be functional, you can add that site to the Trusted sites zone in Internet Explorer. If you attempt to browse an Internet site that makes use of scripting or Active X controls, Internet Explorer will prompt you to consider adding the site to the Trusted sites zone. You should add the site to the Trusted sites zone only if you are completely confident that the site is trustworthy and that the URL to be added is indeed the correct one. For more information, see <A href="#addinternetsites">Add sites to the Trusted sites zone</A>.</LI>

<LI id=List21_2>Access to intranet sites, Web-based applications that run over a local intranet, and other files on network shares may be restricted. If you trust an intranet site or share and need it to be functional, you can add it to the Local intranet zone. For more information, see <A href="#addintranetsites">Add sites to the Local intranet zone</A>.</LI>
</UL>
<P id=ReturnToTop5><A href="#top">Return to top</A></P>

<BR><HR>

<H2 id=Heading2><A name="effects">Effects of Internet Explorer Enhanced Security Configuration</A></H2>

<P id=Text5>Internet Explorer Enhanced Security Configuration adjusts the security levels for the existing security zones. The following table describes how each zone is affected.</P>

<TABLE>
	<TR>
		<TH id=Table1Header1>Zone</TH>
		<TH id=Table1Header2>Security level</TH>
		<TH id=Table1Header4>Result</TH>
	</TR>
	<TR>
		<TD id=Table1_1x1>Internet zone</TD>
		<TD id=Table1_1x2>High</TD>
		<TD id=Table1_1x4>
		This zone has the same security settings as the Restricted sites zone. All Internet and intranet sites are assigned to this zone by default.<BR><BR>
Web pages may not display in Internet Explorer as expected and applications that require the browser may not work correctly because scripts, Microsoft ActiveX controls, the Microsoft virtual machine (Microsoft VM) for HTML content, and file downloads have been disabled. If you trust an Internet site and need it to be functional, you can add that site to the Trusted sites zone in Internet Explorer. For more information, see <A href="#addinternetsites">Add sites to the Trusted sites zone</A>.<BR><BR>
Access to scripts, executable files, and other files on Universal Naming Convention (UNC) shares is restricted unless the share is added to the Local intranet zone explicitly. For more information, see <A href="#addintranetsites">Add sites to the Local intranet zone</A>.
		</TD>
	</TR>
	<TR>
		<TD id=Table1_2x1>Local intranet zone</TD>
		<TD id=Table1_2x2>Medium-Low</TD>
		<TD id=Table1_2x4>When visiting intranet sites, you may be repeatedly prompted for credentials (your user name and password) as a result of the enhanced security configuration. In the past, Internet Explorer automatically passed your credentials to intranet sites. The enhanced security configuration disables the automatic detection of intranet sites. If you want your credentials to be passed automatically to certain intranet sites, add those sites to the Local intranet zone. For more information, see <A href="#addintranetsites">Add sites to the Local intranet zone</A>.<BR><BR>
Do not add Internet sites to the Local intranet zone, because your credentials will be passed automatically to the site if they are requested.<BR><BR>
	</TD></TR>
	<TR>
		<TD id=Table1_3x1>Trusted sites zone</TD>
		<TD id=Table1_3x2>Medium</TD>
		<TD id=Table1_3x4>This zone is for the Internet sites whose content you trust. For more information, see <A href="#addinternetsites">Add sites to the Trusted sites zone</A>.</TD>
	</TR>
	<TR>
		<TD id=Table1_4x1>Restricted sites zone</TD>
		<TD id=Table1_4x2>High</TD>
		<TD id=Table1_4x4>This zone contains sites you don't trust, such as sites that may damage your computer or data if you attempt to download or run files from them.</TD>
	</TR>
</TABLE>

<P id=Text7>The enhanced security configuration also adjusts the Internet Explorer extensibility and security settings to further reduce exposure to possible future security threats. These settings can be found on the Advanced tab of Internet Options in Control Panel. The following table describes the settings that are affected.</P>

<TABLE>
	<TR>
		<TH id=Table2Header1>Feature</TH>
		<TH id=Table2Header2>Entry</TH>
		<TH id=Table2Header3>New setting</TH>
		<TH id=Table2Header4>Result</TH>
	</TR>
	<TR>
		<TD id=Table2_13x1>Browsing</TD>
		<TD id=Table2_13x2>Display enhanced security configuration dialog</TD>
		<TD id=Table2_13x3>On</TD>
		<TD id=Table2_13x4>Displays a dialog box to notify you when an Internet site tries to use scripting or ActiveX controls.</TD>
	</TR>
	<TR>
		<TD id=Table2_1x1>Browsing</TD>
		<TD id=Table2_1x2>Enable Browser Extensions</TD>
		<TD id=Table2_1x3>Off</TD>
		<TD id=Table2_1x4>Disables features you installed for use with Internet Explorer that may have been created by companies other than Microsoft.</TD>
	</TR>
	<TR>
		<TD id=Table2_2x1>Browsing</TD>
		<TD id=Table2_2x2>Enable Install On Demand (Internet Explorer)</TD>
		<TD id=Table2_2x3>Off</TD>
		<TD id=Table2_2x4>Disables installing Internet Explorer components on demand, if needed by a Web page.</TD>
	</TR>
	<TR>
		<TD id=Table2_3x1>Browsing</TD>
		<TD id=Table2_3x2>Enable Install On Demand (Other)</TD>
		<TD id=Table2_3x3>Off</TD>
		<TD id=Table2_3x4>Disables installing Web components on demand, if needed by a Web page.</TD>
	</TR>
	<TR>
		<TD id=Table2_4x1>Microsoft VM</TD>
		<TD id=Table2_4x2>JIT compiler for virtual machine enabled (requires restart)</TD>
		<TD id=Table2_4x3>Off</TD>
		<TD id=Table2_4x4>Disables the Microsoft VM compiler.</TD>
	</TR>
<TR>
		<TD id=Table2_5x1>Multimedia</TD>
		<TD id=Table2_5x2>Don't display online content in the media bar</TD>
		<TD id=Table2_5x3>On</TD>
		<TD id=Table2_5x4>Disables playback of media content in the Internet Explorer media bar.</TD>
	</TR>
	<TR>
		<TD id=Table2_6x1>Multimedia</TD>
		<TD id=Table2_6x2>Play sounds in Web pages</TD>
		<TD id=Table2_6x3>Off</TD>
		<TD id=Table2_6x4>Disables music and other sounds.</TD>
	</TR>
	<TR>
		<TD id=Table2_7x1>Multimedia</TD>
		<TD id=Table2_7x2>Play animations in Web pages</TD>
		<TD id=Table2_7x3>Off</TD>
		<TD id=Table2_7x4>Disables animations.</TD>
	</TR>
<TR>
		<TD id=Table2_8x1>Multimedia</TD>
		<TD id=Table2_8x2>Play videos in Web pages</TD>
		<TD id=Table2_8x3>Off</TD>
		<TD id=Table2_8x4>Disables video clips.</TD>
	</TR>
	<TR>
		<TD id=Table2_9x1>Security</TD>
		<TD id=Table2_9x2>Check for server certificate revocation (requires restart</TD>
		<TD id=Table2_9x3>On</TD>
		<TD id=Table2_9x4>Automatically checks a Web site's certificate to see whether it has been revoked before accepting it as valid.</TD>
	</TR>
	<TR>
		<TD id=Table2_10x1>Security</TD>
		<TD id=Table2_10x2>Check for signatures on downloaded programs</TD>
		<TD id=Table2_10x3>On</TD>
		<TD id=Table2_10x4>Automatically verifies and displays the identity of programs you download.</TD>
	</TR>
	<TR>
		<TD id=Table2_11x1>Security</TD>
		<TD id=Table2_11x2>Do not save encrypted pages to disk</TD>
		<TD id=Table2_11x3>On</TD>
		<TD id=Table2_11x4>Disables saving secured information in your Temporary Internet Files folder.</TD>
	</TR>
	<TR>
		<TD id=Table2_12x1>Security</TD>
		<TD id=Table2_12x2>Empty Temporary Internet Files folder when browser is closed</TD>
		<TD id=Table2_12x3>On</TD>
		<TD id=Table2_12x4>Automatically clears the Temporary Internet Files folder when you close the browser.</TD>
	</TR>
</TABLE>

<P id=Text8>These changes reduce the functionality in Web pages, Web-based applications, local network resources, and applications that use a browser to display online help, support, and general user assistance.</P>

<P id=Text9>For more information on using the Local intranet or Trusted sites zones' inclusion lists, see <A href="#manage">Managing Internet Explorer Enhanced Security Configuration</A>.</P>

<P id=Text24>When Internet Explorer Enhanced Security Configuration is enabled:</P>
  <UL>
  	<LI id=List6_1>The Windows Update Web site is added to the Trusted 
  sites zone. This allows you to continue to get important updates for your operating system.</LI>
	<LI id=List6_2>The Windows error reporting site is added to Trusted sites zone. This allows you to report problems encountered with your operating system and search for fixes.</LI>
  	<LI id=List6_3>Several local machine sites (for example, http://localhost, https://localhost, hcp://system) are added to the Local intranet zone. This allows applications and code to work locally so that you can complete common administrative tasks.</LI>
	<LI id=List6_4>The Platform for Privacy Preferences (P3P) level is set to Medium for the Trusted sites zone. If you want to change the P3P level for any zone other than the Internet Zone, go to the Privacy tab of Internet Options in Control Panel and click <B>Import</B> to apply a custom privacy policy. Sample privacy policies can be found at the <A href="http://go.microsoft.com/fwlink/?LinkId=12939" title="http://msdn.microsoft.com/" target="_new">Microsoft MSDN Library Web site</A><span class="printOnly"> (http://msdn.microsoft.com/workshop/security/privacy/overview/privacyimportxml.asp)</span>.</LI>
  </UL>

<H3 id=Heading3><a name="termserv">Internet Explorer Enhanced Security Configuration and terminal servers</a></H3>

<P id=Text10>The enhanced security configuration applies to different user accounts according to the type of installation. The following table describes how the users are affected.</P>

<TABLE>
	<TR>
		<TH id=Table3Header1>Type of Installation</TH>
		<TH colspan="4" id=Table3Header2>Enhanced security configuration is applied to</TH>

	</TR>
	<TR>
		<TH id=Table3Header3></TH>
		<TH id=Table3Header4>Administrators?</TH>
		<TH id=Table3Header5>Power Users?</TH>
		<TH id=Table3Header6>Limited Users?</TH>
		<TH id=Table3Header7>Restricted Users?</TH>
	</TR>
	<TR>		
		<TD id=Table3_1x1>Upgrading the operating system</TD>
		<TD id=Table3_1x2>Yes</TD>
		<TD id=Table3_1x3>Yes</TD>
		<TD id=Table3_1x4>No</TD>
		<TD id=Table3_1x5>No</TD>
	</TR>
	<TR>
		<TD id=Table3_2x1>Unattended installation of the operating system</TD>
		<TD id=Table3_2x2>Yes</TD>
		<TD id=Table3_2x3>Yes</TD>
		<TD id=Table3_2x4>No</TD>
		<TD id=Table3_2x5>No</TD>
	</TR>
	<TR>
		<TD id=Table3_3x1>Manual installation of Terminal Services</TD>
		<TD id=Table3_3x2>Yes</TD>
		<TD id=Table3_3x3>Yes</TD>
		<TD id=Table3_3x4>Yes**</TD>
		<TD id=Table3_3x5>Yes**</TD>
	</TR>
</TABLE>
<P id=Text11>**  During the manual Terminal Services installation, you are prompted to disable Internet Explorer Enhanced Security Configuration for users. This allows users to run a terminal server session without restrictions.</P>

<P id=Text12>For a better experience when Terminal Services is enabled, you should remove the enhanced security configuration from members of the Users group. These users have fewer privileges on the server, so they present a lower level of risk if they are victims of an attack. For more information about applying the enhanced security configuration, see <A href="#applytospecificusers">Apply Internet Explorer Enhanced Security Configuration to specific users</A>.</P>

<H3 id=Heading4><a name="userex">Effects of Internet Explorer Enhanced Security Configuration on the Internet Explorer user experience</a></H3>

<P id=Text13>The following table describes how Internet Explorer Enhanced Security Configuration affects each user's experience with Internet Explorer.</P>

<TABLE>
	<TR>
		<TH id=Table4Header1>Task</TH>
		<TH colspan="4" id=Table4Header2>Can be completed by</TH>

	</TR>
	<TR>
		<TH></TH>
		<TH id=Table4Header4>Administrators?</TH>
		<TH id=Table4Header5>Power Users?</TH>
		<TH id=Table4Header6>Limited Users?</TH>
		<TH id=Table4Header7>Restricted Users?</TH>
	</TR>
	<TR>		
		<TD id=Table4_1x1>Turn on/off Internet Explorer Enhanced Security Configuration</TD>
		<TD id=Table4_1x2>Yes</TD>
		<TD id=Table4_1x3>No</TD>
		<TD id=Table4_1x4>No</TD>
		<TD id=Table4_1x5>No</TD>
	</TR>
	<TR>		
		<TD id=Table4_2x1>Adjust the security level for a particular zone in Internet Explorer</TD>
		<TD id=Table4_2x2>Yes</TD>
		<TD id=Table4_2x3>Yes</TD>
		<TD id=Table4_2x4>No</TD>
		<TD id=Table4_2x5>No</TD>
	</TR>
	<TR>
		<TD id=Table4_3x1>Add sites to the Trusted sites zone</TD>
		<TD id=Table4_3x2>Yes</TD>
		<TD id=Table4_3x3>Yes</TD>
		<TD id=Table4_3x4>Yes</TD>
		<TD id=Table4_3x5>Yes</TD>
	</TR>
	<TR>
		<TD id=Table4_4x1>Add sites to the Local intranet zone</TD>
		<TD id=Table4_4x2>Yes</TD>
		<TD id=Table4_4x3>Yes</TD>
		<TD id=Table4_4x4>Yes</TD>
		<TD id=Table4_4x5>Yes</TD>
	</TR>
</TABLE>
<P id=Text14>All other Internet Explorer tasks can be completed by all user groups, unless the server administrator chooses to further restrict user access.</P>

<P id=ReturnToTop3><A href="#top">Return to top</A></P>

<BR><HR>

<H2 id=Heading5><A name="manage">Managing Internet Explorer Enhanced Security Configuration</A></H2>

<P id=Text15>Internet Explorer Enhanced Security Configuration is designed to reduce your server's exposure to security threats. To ensure that you get the most benefit from the enhanced security configuration, consider these browser management recommendations:</P>

<UL>
	<LI id=List19_7>All Internet and intranet sites are assigned to the Internet zone by default. If you trust an Internet or intranet site and need it to be functional, add the Internet site to the Trusted sites zone and add the intranet site to the Local intranet zone. For more information on the security levels for each zone, see <A href="#effects">Effects of Internet Explorer Enhanced Security Configuration</A>.</LI>
	<LI id=List19_1>If you want to run a browser-based client application over the Internet, you should add the Web page that hosts the application to the Trusted sites zone. For more information, see <A href="#addinternetsites">Add sites to the Trusted sites zone</A>.</LI>
	<LI id=List19_2>If you want to run a browser-based client application over a protected and secure local intranet, you should add the Web page that hosts the application to the Local intranet zone. For more information, see <A href="#addintranetsites">Add sites to the Local intranet zone</A>.</LI>
	<LI id=List19_3>Add internal sites and local servers to the Local intranet zone to make sure you have access to, and can run, applications from your servers.</LI>
	<LI id=List19_4>Use unattend.txt to add intranet sites and UNC servers to the Local intranet zone inclusion list as part of the installation process. For more information, see the Readme file in Deploy.cab on the Windows product CD.</LI>
	<LI id=List19_5>Use client computers to download drivers, service packs, and so on, and avoid any browsing on servers.</LI>
	<LI id=List19_6>If you use disk imaging to install operating systems on your servers, add the intranet sites and UNC servers you trust to the Local intranet zone and add the Internet sites that you trust to the Trusted sites zone on the base image. You can then change the list for images relative to different server types and needs.</LI>
</UL>

<H3 id=Heading6><A name="addinternetsites">Add sites to the Trusted sites zone</A></H3>

<P id=Text16>When Internet Explorer Enhanced Security Configuration is enabled on your server, the security settings for all Internet sites are set to High. If you trust a Web page and need it to be functional, you can add that page to the Trusted sites zone in Internet Explorer.</P> 

<OL>
  	<LI id=List7_1>Navigate to the site that you want to add.
  	<UL>
		<LI id=List8_1>If you are already viewing the site that you want to add, continue to step 2.</LI>
  		<LI id=List8_2>If you know the URL of the site that you want to add, open Internet Explorer, type the site URL in the Address bar, and then wait for the site to load.</LI></UL></LI>
	<LI id=List7_2>On the <B>File</B> menu, click <B>Add this site to</B>, and then click <B>Trusted Sites Zone</B>. </LI>
	<LI id=List7_5>In the <B>Trusted sites</B> dialog box, click <B>Add</B> to move the site to the list, and then click <B>Close</B>.</LI>
	<LI id=List7_3>Refresh the page to view the site from its new zone.</LI>
	<LI id=List7_4>Check the Status bar of the browser to confirm that the site is in the <B>Trusted sites zone</B>.</LI>
</OL>

<P class="note" id=Notes2>Notes</P>
<UL>
	<LI id=List9_8>If an Internet site tries to use scripting or ActiveX controls, a dialog box is displayed to notify you. You can add the Internet site to the Trusted sites zone directly from this dialog box. If you have disabled this dialog box, you can re-enable the dialog box in Internet Explorer. On the Tools menu, click <B>Internet Options</B>. On the Advanced tab, select <B>Display enhanced security configuration dialog</B>.</LI>
	<LI id=List9_5>A Web page can be part of only one zone at a time &mdash; you cannot add a page to both the Trusted sites zone and the Local intranet zone.</LI>
	<LI id=List9_1>When you add a Web page to the Trusted sites zone, you are adding the domain for that page. Therefore, all pages within that domain are also added. For example, if you add http://www.microsoft.com/windowsxp/expertzone/ to your Trusted sites zone, you are adding http://www.microsoft.com. If you then want to view the Windows Help and Support site, you will have to add http://support.microsoft.com separately, because the Windows Help and Support site is a separate domain.</LI>
	<LI id=List9_6>Internet Explorer maintains two different lists of sites for the Trusted Sites zone. One list is in effect when the enhanced security configuration is enabled, and a separate list is in effect when the enhanced security configuration is disabled. When you add a Web page to the Trusted sites zone, you are adding it only to the list that is currently in effect.</LI>
	<LI id=List9_2>You can use wildcards to add all sub-domains for a given domain. For example, you can add *.microsoft.com to the list, which adds both www.microsoft.com and support.microsoft.com.</LI>
	<LI id=List9_3>Many Internet sites use more than one domain to host their content. You may have to add several domains to the Trusted sites zone to have full functionality for one site.</LI>
	<LI id=List9_4>During installation you can add many sites at one time to the Trusted sites zone by using certain settings in unattend.txt. For more information, see the Readme file in Deploy.cab on the Windows product CD. You can also use Group Policy to add and manage multiple sites. For more information, see the <I>Microsoft Windows Server 2003 Deployment Kit</I>.</LI></UL>

<H3 id=Heading7><A name="addintranetsites">Add sites to the Local intranet zone</A></H3>

<P id=Text18>When Internet Explorer Enhanced Security Configuration is enabled, the security settings for all intranet sites are set to High. As a result, you are prompted for your credentials (your user name and password) each time you visit intranet sites that have not been added to the Local intranet zone. If you routinely use intranet sites, and you know those sites are trustworthy, you can add them to the Local intranet zone in Internet Explorer.</P>

<OL>
  	<LI id=List10_1>Navigate to the site that you want to add.
  	<UL><LI id=List11_1>If you are already viewing the site that you want to add, continue to step 2.</LI>
  		<LI id=List11_2>If you know the URL of the site that you want to add, open Internet Explorer, type the site URL in the Address bar, and then wait for the site to load.</LI></UL></LI>
	<LI id=List10_2>On the <B>File</B> menu, click <B>Add this site to</B>, and then click <B>Local Intranet Zone</B>.</LI>
	<LI id=List10_5>In the <B>Local intranet</B> dialog box, click <B>Add</B> to move the site to the list, and then click <B>Close</B>.</LI>
	<LI id=List10_3>Refresh the page to view the site from its new zone.</LI>
	<LI id=List10_4>Check the Status bar of the browser to confirm that the site is in the <B>Local intranet zone</B>.</LI>
	</OL>
	
<P class="note" id=Notes3>Notes</P>
<UL>
	<LI id=List12_4>Do not add Internet sites to the Local intranet zone, because your credentials are passed automatically to the site if they are requested.</LI>
	<LI id=List12_5>A Web page can be part of only one zone at a time &mdash; you cannot add a page to both the Trusted sites zone and the Local intranet zone.</LI>
	<LI id=List12_1>The enhanced security configuration also restricts access to scripts, executable files, and other potentially unsafe files on a UNC path unless it is added to the Local Intranet zone explicitly. For example, if you want to access <I>\\server\share\setup.exe</I>, you must add <I>\\server</I> to the Local intranet zone.</LI>
	<LI id=List12_2>When you add a Web page to the Local intranet zone, you are adding the domain for that page. Therefore, all pages within that domain are also added. For example, if you add http://<i>YourIntranetServer/SubWeb</i> to your Local intranet zone, you are adding http://<i>YourIntranetServer</i>.</LI>
	<LI id=List12_6>Internet Explorer maintains two different lists of sites for the Local intranet zone. One list is in effect when the enhanced security configuration is enabled, and a separate list is in effect when the enhanced security configuration is disabled. When you add a Web page to the Local intranet zone, you are adding it only to the list that is currently in effect.</LI>
	<LI id=List12_3>During installation you can add many sites at one time to the Local intranet zone by using certain settings in unattend.txt. For more information, see the Readme file in Deploy.cab on the Windows product CD. You can also use Group Policy to add and manage multiple sites. For more information, see the <I>Microsoft Windows Server 2003 Deployment Kit</I>.</LI>
</UL>	


<H3 id=Heading8><A name="applytospecificusers">Apply Internet Explorer Enhanced Security Configuration to specific users</A></H3>

<P id=Text19>Internet Explorer Enhanced Security Configuration allows you to control the level of Internet Explorer access allowed to certain user groups on your server.</P>

<OL>
<LI id=List13_1>Open <B>Control Panel</B>, click <B>Add or Remove Programs</B>, and then click <B>Add/Remove Windows Components</B>.</LI>
<LI id=List13_2>Select <B>Internet Explorer Enhanced Security Configuration</B>, and then click <B>Details</B>.</LI>
<LI id=List13_3>Select the user group(s) that you want to apply the enhanced security configuration to &mdash; Administrators, Users, or both &mdash; and then click <B>OK</B>.</LI> 
<LI id=List13_4>Click <B>Next</B>, and then click <B>Finish</B>.</LI> 
<LI id=List13_5>Restart Internet Explorer to apply the enhanced security settings.</LI>
</OL>
 

<P class="note" id=Notes4>Notes</P>
<UL>
	<LI id=List14_1>When you apply Internet Explorer Enhanced Security Configuration to the Administrators group, the settings are applied to Administrators and Power Users. When you apply Internet Explorer Enhanced Security Configuration to the Users group, the settings are applied to Limited and Restricted Users.</LI>
	<LI id=List14_2>For up-to-date information about Internet Explorer security zones, go to the <A href="http://go.microsoft.com/fwlink/?LinkId=12658" title="http://msdn.microsoft.com/" target="_new">Microsoft MSDN Library Web site</A><span class="printOnly"> (http://msdn.microsoft.com/workshop/security/szone/overview/templates.asp)</span>.</LI>
</UL>

<H3 id=Heading9><a name="W2k_default">Apply Windows&nbsp;2000 default Internet Explorer security settings</a></H3>

<P id=Text20>If Internet Explorer Enhanced Security Configuration is enabled on your server, you may find it necessary to use the default Internet Explorer security settings of Windows&nbsp;2000.</P>

<OL>
  <LI id=List15_1>Open <B>Control Panel</B>, click <B>Add or Remove Programs</B>, and then click <B>Add/Remove Windows Components</B>.</LI> 
  <LI id=List15_2>Select <B>Internet Explorer Enhanced Security Configuration</B>, click the check box to clear the selection, and then click <B>OK</B>.</LI> 
  <LI id=List15_3>Click <B>Next</B> and then click <B>Finish</B>.</LI> 
  <LI id=List15_4>Restart Internet Explorer to apply the changes.</LI>
  </OL>
<P class="important" id=Notes5>Important</P>
<UL>
  <LI id=List20_1>When you restore Windows 2000 security settings for Internet Explorer, you also restore the lists of Trusted sites and Local intranet sites that were in effect at the time Internet Explorer Enhanced Security Configuration was applied.</LI>
  <LI id=List20_2>Applying the Windows&nbsp;2000 default Internet Explorer security settings increases your server's exposure to potential attacks from malicious Web-based content.</LI>
</UL>

<H3 id=Heading10><a name="strengthen">Strengthen Internet Explorer security settings manually on your server</a></H3>

<P id=Text21>If you do not use Internet Explorer Enhanced Security Configuration in your environment, you can easily strengthen Internet Explorer by using Internet Options in Control Panel to manually raise the security settings on your server.</P> 

<OL>
  <LI id=List16_1>Open <B>Internet Explorer</B>.</LI>  
  <LI id=List16_2>On the <B>Tools</B> menu, click <B>Internet Options</B>.</LI>

  <LI id=List16_3>On the <B>Security</B> tab, select the Web content zone you want to adjust: Internet, Local intranet, Trusted sites, or Restricted sites.</LI>

  <LI id=List16_4>Under Security level for this zone, click <B>Default Level</B> to use the default security level for the zone, or click <B>Custom Level</B> and then select the settings you want.</LI>
  </OL>

<P class="note" id=Notes6>Notes</P>
<UL>
	<LI id=List17_1>For Restricted sites, click <B>Custom Level</B>, and then click a level in the <B>Reset to</B> list.</LI>
	<LI id=List17_2>For up-to-date information about Internet Explorer security zones, go to the <A href="http://go.microsoft.com/fwlink/?LinkId=12658" title="http://msdn.microsoft.com/" target="_new">Microsoft MSDN Library Web site</A><span class="printOnly"> (http://msdn.microsoft.com/workshop/security/szone/overview/templates.asp)</span>.</LI>
</UL>



<P id=ReturnToTop1><A href="#top">Return to top</A></P>

<BR><HR>

<H2 id=Heading11><A name="bestpractices">Browser Security &mdash; Best Practices</A></H2>
<P id=Text22>Using servers for Internet browsing does not adhere to sound security practices because Internet browsing increases the exposure of your server to potential security attacks. Regardless of the browser you use, you should restrict browsing on your server.</P>

<P id=Text23>To reduce the risk to your server of potential attacks from malicious Web-based content:</P>

<UL>
	<LI id=List18_1>Do not use servers for browsing general Web content.</LI>
	<LI id=List18_5>Use client computers to download drivers, service packs, and so on.</LI>
	<LI id=List18_2>Do not view sites that you cannot confirm are secure.</LI>
	<LI id=List18_3>Use a limited user account instead of an administrator account for general Web browsing.</LI>
	<LI id=List18_4>Use Group Policy to keep unauthorized users from making inappropriate changes to browser security settings.</LI></UL>

<P id=ReturnToTop2><A href="#top">Return to top</A></P>


</body>
</html>
