When you are deciding which configuration options to install on your users' computers, you should consider the following user needs:
Note This section describes security and privacy options of Internet Explorer that are particularly important for administrators who need to protect the information, network, and users within their corporate environment. These options, though, may also be valuable for many other organizations and users.
Because Web browsers enable users to actively exchange important information and programs through the Internet and intranet, you must consider the security requirements needed to protect your users' privacy and the contents of their exchanges. You need to make educated choices about the types of browser security and privacy that you want to implement for your users.
Internet Explorer supports a wide range of Internet protocols for secure information transfers and financial transactions over the Internet or intranet. Internet Explorer also provides a variety of features to help users ensure the privacy of their information and the safety of their work environment. Users can set their own security and privacy options from within the browser, or you can preconfigure these options as part of your custom browser packages. When you preconfigure these settings, you have the option of locking them down, which prevents users from changing them. For more information about preconfiguring security options, see Chapter 15, "Running the Internet Explorer Customization Wizard."
You can implement the following options, depending on the security and privacy needs of your users:
After establishing zones of trust, you can set browser security levels for each zone. Then you can control settings for ActiveX controls, downloading and installation, scripting, cookie management, password authentication, cross-frame security, and Java capabilities based on the zone to which a site belongs.
For more information about Internet Explorer security, see Chapter 6, "Digital Certificates," Chapter 7, "Security Zones and Permission-Based Security for Microsoft Virtual Machine," and Chapter 8, "Content Ratings and User Privacy."
You may need to deploy Internet Explorer in more than one language, depending on the diversity of your user community. To do so, you must create and distribute a separate Internet Explorer custom package for each language version you want to deploy. When you create additional packages for different language versions, you do not need to reenter your setup and browser settings. For more information about selecting the language for your custom package of Internet Explorer, see Chapter 15, "Running the Internet Explorer Customization Wizard."
Internet Explorer also includes several Input Method Editors (IMEs), which you can deploy with your custom packages. IMEs enable users to input Chinese, Japanese, and Korean text into Web forms and e-mail messages using any Windows 32-bit language version. Then users can start any language version of Internet Explorer, Outlook Express, or Outlook, and write in Chinese, Japanese, or Korean without the need for a special keyboard or a different language browser. For example, a business based in New York could use its English version of the browser to send messages in Korean to an overseas affiliate, or a student attending classes in Paris could write home in Japanese.
You may need to address the needs of users who are affected by the following disabilities:
Internet Explorer provides many features that benefit users who have disabilities, such as screen readers, customizable layout, and other accessibility aids. For more information about using accessibility features, see Chapter 10, "Accessibility Features and Functionality," and Internet Explorer 5 Help.
You may need to customize your user training and support to meet the different learning needs, backgrounds, and skill levels of your users. Consider these groups, which may be part of your user community:
After assessing your user groups, you may decide not to implement formal training and support, depending on the Internet Explorer components and features that you install. Instead, you can point your users to the built-in browser support. Help files included with Internet Explorer provide users with a comprehensive set of topics, which they can access from within the browser. Also, Microsoft offers complete support services through the Online Support option on the browser Help menu.
If you decide to offer formal training and support for your users, you will need to acquire the following resources:
You may choose to offer a variety of learning methods - including online or in-person demonstrations, training and support Web pages, computer-based training (CBT), instructor-led training classes, self-paced learning materials, or desk-side support - depending on the needs of your users. Also, the types of training and support that you offer can depend on the amount of time that users can dedicate to those activities and the resources and facilities that are available.
If in-house staff is not available, you might want to use outside vendors to develop and conduct your user training and support. The vendor must be able to meet your schedule and budget, and tailor training and support based on the needs of your organization and users.
After you have decided the best training and support strategies for your organization, you should document this information in formal training and support plans. For more information, see "Developing User Training and Support Plans" later in this chapter. Also, you should plan for ongoing training and support. For more information, see Chapter 23, "Implementing an Ongoing Training and Support Program."