Security Zones and Permission-Based Security for Microsoft Virtual Machine
Microsoft Internet Explorer 5 provides comprehensive management and enforcement of Internet and network security. This chapter describes two key features of security management: security zones and permission-based security for Microsoft Virtual Machine. Read this chapter to learn how these security features can help protect access to individuals and information in your organization.
In This Chapter
Understanding Security Zones
Setting Up Security Zones
Understanding Permission-Based Security for Microsoft Virtual Machine
Setting Up Java Custom Security
See Also
- For more information about configuring digital certificates, see Chapter 6, "Digital Certificates."
- For more information about Internet Explorer features that help ensure user privacy, see Chapter 8, "Content Ratings and User Privacy."
- For more information about planning user security before Internet Explorer installation, see Chapter 9, "Planning the Deployment."
- For more information about Internet Explorer system policies and restrictions that enable you to preconfigure security settings, see Appendix E, "Setting System Policies and Restrictions."