Understanding Zones
To provide optimal security for untrusted Web sites while allowing elevated privileges for trusted Web sites, Internet Explorer provides multiple security zones:
- Internet All Web sites that are not listed in the trusted or restricted zones. Sites in this zone are restricted from viewing private information on your computer (including cookies or temporary files from other Web sites) and cannot make permanent changes to your computer.
- Local Intranet Web sites on your intranet. Internet Explorer can detect automatically whether a Web site is on your intranet. Additionally, you can add Web sites manually to this zone.
- Trusted Sites Web sites that administrators have added to the Trusted Sites list because they require elevated privileges. Trusted Sites do not use Protected Mode, which could introduce security weaknesses. Therefore, you need to select the Web sites added to the Trusted Sites zone carefully. You don't need to add all sites you trust to this zone; instead, you should add only sites that you trust and that cannot work properly in the Internet or intranet zones. By default, this zone is empty.
- Restricted Sites Web sites that might be malicious and should be restricted from performing any potentially dangerous actions. You need to use this zone only if you plan to visit a potentially malicious Web site and you need to minimize the risk of a security compromise. By default, this zone is empty.
Note When moving from a trusted site to an untrusted site or vice versa, Internet Explorer warns the user and opens a new window. This reduces the risk of users accidentally trusting a malicious site.
In this tutorial:
- Managing Windows Internet Explorer
- Internet Explorer 8 Improvements
- InPrivate Browsing
- InPrivate Filtering
- Compatibility View
- SmartScreen
- Domain Highlighting
- Tab Isolation
- Accelerators
- Improvements Previously Introduced in Internet Explorer 7
- User Interface Changes
- Tabbed Browsing
- Search Bar
- How to Create a Web Link to Add a Custom Search Provider
- How to Configure Custom Search Providers Using the Registry
- How to Configure Custom Search Providers Using Group Policy
- RSS Feeds
- Improved Standards Support
- Expanded Group Policy Settings
- Defending Against Malware
- How Protected Mode Improves Security
- How the Protected Mode Compatibility Layer Works
- How to Solve Protected Mode Incompatibilities
- URL-Handling Protection
- Address Bar Visibility
- Cross-Domain Scripting Attack Protection
- Controlling Browser Add-ons
- Add -on Manager Improvements
- Protecting Against Data Theft
- Security Status Bar
- How the Smart Screen Filter Works
- How to Configure Smart Screen Options
- Deleting Browsing History
- Blocking IDN Spoofing
- Security Zones
- Understanding Zones
- Configuring Zones on the Local Computer
- Configuring Zones Using Group Policy
- Network Protocol Lockdown
- Managing Internet Explorer Using Group Policy
- Group Policy Settings for Internet Explorer 7 and Internet Explorer 8
- New Group Policy Settings for Internet Explorer 8
- Using the Internet Explorer Administration Kit
- Troubleshooting Internet Explorer Problems
- Internet Explorer Does Not Start
- An Add-on Does Not Work Properly
- Some Web Pages Do Not Display Properly
- Preventing Unwanted Toolbars
- The Home Page or Other Settings Have Changed