Chapter 7Chapter image

Security Zones and Permission-Based Security for Microsoft Virtual Machine

Microsoft Internet Explorer 5 provides comprehensive management and enforcement of Internet and network security. This chapter describes two key features of security management: security zones and permission-based security for Microsoft Virtual Machine. Read this chapter to learn how these security features can help protect access to individuals and information in your organization.

In This Chapter

Understanding Security Zones

Setting Up Security Zones

Understanding Permission-Based Security for Microsoft Virtual Machine

Setting Up Java Custom Security

See Also



Arrow: Top of page