Network Protocol Lockdown
Sometimes you might want to apply different security settings to specific protocols within a zone. For example, you might want to configure Internet Explorer to lock down HTML content hosted on the Shell: protocol if it is in the Internet zone. Because the Shell: protocol's most common use is for local content and not Internet content, this mitigation can reduce the attack surface of the browser against possible vulnerabilities in protocols less commonly used than HTTP.
By default, Network Protocol Lockdown is not enabled, and this setting is sufficient for most environments. If you choose to create a highly restrictive desktop environment, you might want to use Network Protocol Lockdown to mitigate security risks. Configuring Network Protocol Lockdown is a two-phase process, as follows:
- Configure the protocols that will be locked down for each zone Enable the Group Policy setting for the appropriate zone and specify the protocols that you want to lock down. The Group Policy settings are located in both User Configuration and Computer Configuration under Administrative Templates\Windows Components \Internet Explorer\Security Features\Network Protocol Lockdown\Restricted Protocols Per Security Zone.
- Configure the security settings for the locked-down zones Enable the Group Policy setting for the zone and specify a restrictive template or configure individual security settings. The Group Policy settings are located in both User Configuration and Computer Configuration under Administrative Templates\Windows Components \Internet Explorer\Security Page\.
In this tutorial:
- Managing Windows Internet Explorer
- Internet Explorer 8 Improvements
- InPrivate Browsing
- InPrivate Filtering
- Compatibility View
- SmartScreen
- Domain Highlighting
- Tab Isolation
- Accelerators
- Improvements Previously Introduced in Internet Explorer 7
- User Interface Changes
- Tabbed Browsing
- Search Bar
- How to Create a Web Link to Add a Custom Search Provider
- How to Configure Custom Search Providers Using the Registry
- How to Configure Custom Search Providers Using Group Policy
- RSS Feeds
- Improved Standards Support
- Expanded Group Policy Settings
- Defending Against Malware
- How Protected Mode Improves Security
- How the Protected Mode Compatibility Layer Works
- How to Solve Protected Mode Incompatibilities
- URL-Handling Protection
- Address Bar Visibility
- Cross-Domain Scripting Attack Protection
- Controlling Browser Add-ons
- Add -on Manager Improvements
- Protecting Against Data Theft
- Security Status Bar
- How the Smart Screen Filter Works
- How to Configure Smart Screen Options
- Deleting Browsing History
- Blocking IDN Spoofing
- Security Zones
- Understanding Zones
- Configuring Zones on the Local Computer
- Configuring Zones Using Group Policy
- Network Protocol Lockdown
- Managing Internet Explorer Using Group Policy
- Group Policy Settings for Internet Explorer 7 and Internet Explorer 8
- New Group Policy Settings for Internet Explorer 8
- Using the Internet Explorer Administration Kit
- Troubleshooting Internet Explorer Problems
- Internet Explorer Does Not Start
- An Add-on Does Not Work Properly
- Some Web Pages Do Not Display Properly
- Preventing Unwanted Toolbars
- The Home Page or Other Settings Have Changed