Tests Help
Browser Security Policy – Windows
B-9
4.
Enter a domain name or IP address in the
Add this Web site to the zone
text
box.
5.
Click
Add
.
6.
Click
OK
.
Internet Explorer (IE) Trusted Sites Security Zone
Description:
This test verifies that the endpoint attempting to connect to your
system is configured according to your specified trusted sites security zone
standards.
Test properties:
Select the Internet Explorer trusted sites security zone settings
required on your network.
■
High
. Disables all ActiveX Controls and plug-ins, disables file down-
loads, prompts for font downloads, disables or prompts for Miscella-
neous options, disables Scripting, requires login.
■
Medium
. A mix of enabled, disabled and prompt for ActiveX controls,
enables downloads, a mix of enabled, disabled and prompt for Miscel-
laneous options, enables Scripting, enables automatic login for
intranet
■
Medium-low
. A mix of enabled, disabled and prompt for ActiveX
controls, enables downloads, a mix of enabled, disabled and prompt
for Miscellaneous options, enables Scripting, enables automatic login
for intranet
■
Low
. A mix of enabled and prompt ActiveX controls, enables down-
loads, a mix of enabled and prompt for Miscellaneous options,
enables Scripting, enables automatic login
How Does this Affect Me?
The trusted sites security zone defines a security
level for all trusted Web sites that you visit. The default setting is
Low
. You also
define the specific sites by name or IP address that are trusted. For example,
you could specify www.mycompany.com as a trusted site.
The following link provides details about the specific security options:
http://www.microsoft.com/technet/prodtechnol/ie/ieak/techinfo/deploy/60/
en/security.mspx?mfr=true
What do I need to do?
1.Perform the following steps:
1.
Select
Tools>>Internet Options>>Security>>Trusted sites
Summary of Contents for 800 Series
Page 1: ...Users Guide www procurve com ProCurve Network Access Controller 800 ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 70: ...System Configuration Management Server 3 22 Figure 3 9 System Configuration Management Server ...
Page 79: ...System Configuration User Accounts 3 31 Figure 3 12 System Configuration User Accounts ...
Page 87: ...System Configuration User Roles 3 39 Figure 3 16 System Configuration User Roles ...
Page 206: ... This page intentionally left blank ...
Page 229: ...End user Access Mac OS X Endpoint Settings 5 23 Figure 5 8 Mac System Preferences ...
Page 262: ... This page intentionally left blank ...
Page 284: ... This page intentionally left blank ...
Page 298: ... This page intentionally left blank ...
Page 302: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 303: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 305: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 308: ... This page intentionally left blank ...
Page 311: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 314: ... This page intentionally left blank ...
Page 319: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 320: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 376: ... This page intentionally left blank ...
Page 414: ... This page intentionally left blank ...
Page 421: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 474: ... This page intentionally left blank ...
Page 520: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 526: ... This page intentionally left blank ...
Page 556: ... This page intentionally left blank ...
Page 584: ... This page intentionally left blank ...
Page 585: ......