Windows Vista Security GuideChapter 2: Defend Against MalwareMalicious software, or malware, is any program or file that is harmful to a computer user. Examples of malware include computer viruses, worms, Trojan horse programs, and spyware that gathers information about a computer user without permission. Windows Vista™ includes several new technologies that you can use to help enhance protection against malware for computers running Windows Vista in your environment. You can use these features and services in addition to the settings included in the Group Policy objects (GPOs) described in the previous chapter, some of which also help provide protection against malware. In Windows Vista, Microsoft® Internet Explorer® 7 also includes several enhancements that help protect against malware. Technologies that help prevent the installation of unwanted software, and technologies that help guard against unauthorized transmission of personal data greatly increase browser security and privacy protection. This chapter provides overviews of these technologies, and recommendations on how to configure them when applicable. You can implement these recommendations in the appropriate GPOs described in Chapter 1, "Implementing the Security Baseline." However, it is important to note that many of the settings for these technologies require information specific to your environment. For this reason, most of the recommended values for these additional settings are not included in the GPOs described in the previous chapter. All of these technologies are by default configured to provide enhanced protection for computers running Windows Vista in the Enterprise Client (EC) environment. However, there are some new Group Policy settings that you can use to help customize the behavior and functionality of these technologies to provide even better protection against malware for your environment. This chapter divides into the following new and enhanced security technologies in Windows Vista and Internet Explorer 7:
Note For each of these areas in the chapter, specific Group Policy settings are highlighted to document the default configuration for a new installation of Windows Vista. Specific setting modifications or recommendations are denoted with the ‡ symbol. For more details on these setting values, see Appendix A, "Security Group Policy Settings." On This Page
Windows Vista Defense TechnologiesWindows Vista includes several new and enhanced technologies that provide enhanced defense against malware. These technologies include:
In addition to these protection technologies it is important to understand that logging in as a standard user account is still a highly recommended security practice. Even with all these protection technologies in place, if you are not protecting who has the ability to gain administrative level access to your computers, you are exposing them to risk. User Account ControlWindows Vista includes User Account Control (UAC) to provide a method of separating standard user privileges and tasks from those that require administrator access. UAC increases security by improving the user experience while running as a standard user account. Users can now perform more tasks and enjoy higher application compatibility without the need to be logged in with administrative level privileges. This helps reduce the affect of malware, the installation of unauthorized software, and unapproved system changes. Note In previous versions of the Windows operating system, the Power Users group was designed to enable members of this group to perform system tasks, such as installing applications without full administrator permissions. UAC does not use the Power Users group, and the permissions granted to it in Windows Vista have been removed. However, the Power Users group is still available for backward compatibility with other versions of the operating system. To use the Power Users group in Windows Vista, you must apply a new Security Template to change the default permissions on system folders and the registry to grant members of the Power Users group permissions equivalent to those for this group in Windows XP. In Windows Vista, standard users can now perform many tasks that previously required administrator access but did not adversely affect security. Examples of tasks that standard users can now perform include modifying time zone settings, connecting to a secure wireless network, and installing approved devices and Microsoft ActiveX® controls. Furthermore, the Administrator Approval Mode feature in the UAC technology also helps protect computers running Windows Vista from some types of malware. By default, administrators can run most programs and tasks with standard user privileges. When users need to perform administrative tasks, such as installing new software or modifying certain system settings, they are first prompted for consent before they can complete such tasks. However, this mode does not provide the same level of protection as a standard user account and it does not guarantee that malicious software already on the client computer cannot tamper with the elevated software. It also does not guarantee that the elevated software itself will not attempt malicious actions after it is elevated. To take advantage of this technology, you can configure new Group Policy settings in Window Vista to control how UAC behaves. The Group Policy settings described in the previous chapter are configured to enforce prescribed behavior for UAC. However, Microsoft recommends reviewing the prescriptions for these settings, which are described in Appendix A, "Security Group Policy Settings," to ensure that they are optimally configured to meet the needs of your environment. Risk AssessmentUsers who have administrative privileges log on with their administrative capabilities enabled. This could allow administrative tasks to occur accidentally or maliciously without the knowledge of the individual. For example:
Risk MitigationThe recommended mitigation approach is to ensure that all users log on using a standard user account for everyday tasks. Users should only elevate to an administrator level account for tasks that require that level of access. Also ensure that UAC is enabled to prompt the user when an attempt is made to perform a task that requires administrative privileges. Mitigation ConsiderationsUAC can help mitigate the risks described in the previous "Risk Assessment" section. However, it is important to consider the following:
Mitigation ProcessStart the mitigation process by investigating the full capabilities of UAC. For more information, see Windows Vista User Account Control Step by Step Guide and Getting Started with User Account Control on Windows Vista. To use this mitigation process
Using Group Policy to Mitigate Risk for UACYou can configure the UAC settings in the following location in the Group Policy Object Editor: Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options The following table provides security setting information specific to this technology in Windows Vista. Table 2.1 UAC Control Settings
This table provides a simple description for each setting. For more information about a specific setting, see the Explain tab of the setting in the Group Policy Object Editor. You can configure the UAC Credentials user interface (UI) in the following location in the Group Policy Object Editor: Computer Configuration\Administrative Templates\Windows Components\Credential User Interface The following table provides security setting information specific to this technology in Windows Vista. Table 2.2 UAC Credential User Interface Settings
This table provides a simple description for each setting. For more information about a specific setting, see the Explain tab of the setting in the Group Policy Object Editor. You can configure the ActiveX Installer Service in the following location in the Group Policy Object Editor: Computer Configuration\Administrative Templates\Windows Components\ActiveX Installer Service The following table provides security setting information specific to the ActiveX Installer Service in Windows Vista. Table 2.3 ActiveX Installer Service
This table provides a simple description for this setting. For more information about this setting, see the Explain tab of the setting in the Group Policy Object Editor. Windows DefenderWindows Defender is a program included in Windows Vista that is also available as a download for Windows XP. It helps protect computers against pop-ups, slow performance, and security threats caused by spyware and other unwanted software. Windows Defender monitors, in real time, important checkpoints of the Windows Vista operating system that this unwanted software targets, such as the Startup folder and the autorun entries in the registry. Windows Defender also helps detect and remove unwanted applications, such as adware, keyloggers, and spyware. When a program tries to modify a protected area in Windows Vista, Windows Defender prompts the user to either allow or reject the change in an effort to guard against spyware installation. This monitoring enhances the reliability of computers running Windows Vista, and helps provide additional user privacy protection. Windows Defender is enabled by default in Windows Vista, and although the technology provides you with enhanced protection against spyware, you can also use it with other third-party protection products. To offer the best protection against malicious software, Microsoft strongly recommends that customers also deploy a full antivirus solution in conjunction with Windows Defender. You can configure new Group Policy settings in Window Vista to control how Windows Defender behaves. The Group Policy settings described in the previous chapter do not contain any settings that modify the default behavior of Windows Defender because the values for these settings are likely to be specific to the requirements of your environment. Microsoft SpyNet CommunityMicrosoft SpyNet is an online community dedicated to helping a computer user choose how to respond to potential spyware threats. The community also helps stop the spread of new spyware infections. When Windows Defender detects software or changes by software not yet classified for risks, you can see how other members are responding to the alert. In turn, actions you take help other community members choose how to respond. Your actions also help Microsoft choose which software to investigate for potential threats. You can choose to send basic or additional information about detected software. Additional information helps improve how Windows Defender works. For example, the technology can include the location of detected items on your computer if harmful software has been removed. In these cases, Windows Defender will automatically collect and send the information to the community. Risk AssessmentSpyware presents a number of serious risks to an organization that need to be mitigated to ensure that data and computers are not compromised. The most common identifiable risks that spyware create for an organization include:
Risk MitigationWindows Defender is designed to mitigate risks related to spyware. Regular updates for the technology are provided automatically via the Windows Update or you can instead use Microsoft Windows Server Update Services (WSUS). In addition to the spyware protection that Windows Defender offers, Microsoft also strongly recommends installing an antivirus package that is capable of extending your spyware protection to detect viruses, Trojan horse programs, and worms. For example, products such as Microsoft Forefront Client Security provide unified malware defense for business desktops, laptops, and server operating systems. Mitigation ConsiderationsWindows Defender is enabled by default in Windows Vista. The technology is designed to be as unobtrusive as possible to users under normal operational conditions. However, organizations should consider the following recommendations as part of deploying Windows Vista:
Mitigation ProcessBecause Windows Defender is a default part of the operating system, no additional steps are required to activate Windows Defender. However, there are a few additional steps that Microsoft recommends considering to ensure that your organization stays protected. To use this mitigation process
Using Group Policy to Mitigate Risk for Windows DefenderYou can review and configure the available Windows Defender settings in the following location in the Group Policy Object Editor: Computer Configuration\Administrative Templates\Windows Components\Windows Defender Table 2.4 Windows Defender Control Settings
This table provides a simple description for each setting. For more information about a specific setting, see the Explain tab of the setting in the Group Policy Object Editor. Windows FirewallA personal firewall is a critical line of defense against many kinds of malware. Like the firewall functionality in Windows XP Service Pack 2 (SP2), the firewall in Windows Vista is turned on by default to help protect the user’s computer as soon as the operating system is operational. Windows Firewall in Windows Vista includes both inbound and outbound filtering to help protect users by restricting operating system resources that behave unexpectedly. The firewall is also integrated with the Windows Vista network awareness so that specialized rules can be applied depending on the location of the client computer. For example, if a laptop computer is located on an organization's network, firewall rules can be defined by the administrator of the domain network environment that will match the security requirements of that network. However when a user attempts to connect the same laptop to the Internet via a public network, such as a free wireless hotspot, a different set of firewall rules can be automatically used to help ensure the computer is protected from an attack. In addition, for the first time in a Windows operating system, Windows Vista integrates firewall management with Internet Protocol security (IPsec). In Windows Vista, a single console, known as the Windows Firewall with Advanced Security console, integrates IPsec and firewall management. The console centralizes inbound and outbound traffic filtering, and IPsec server and domain isolation settings in the user interface to simplify configuration and reduce policy conflicts. Risk AssessmentA network connection is a vital requirement in modern business. However this connection has also become a major target for attackers. The threats associated with connectivity need to be mitigated to ensure that data or computers are not compromised. The most commonly identifiable threats to an organization from network-based attacks include:
Risk MitigationThe firewall in Windows Vista provides protection to the client computer out of the box. The firewall blocks most unsolicited inbound traffic until a change is made either by an administrator or by Group Policy. Windows Firewall also includes outbound network traffic filtering, and out of the box this rule is set to "Allow" for all outgoing network traffic. You can use Group Policy settings to configure these rules in the Windows Vista firewall to ensure that client security settings remain constant. Mitigation ConsiderationsThere are a few issues that you should consider if you are planning to use the firewall in Windows Vista:
Mitigating Risk Using Windows Firewall with Advanced SecurityWindows Vista includes new Group Policy settings and management UI that assist you with configuring the new functionality available in the Windows Vista firewall. The advanced security settings for Windows Vista do not apply on a client computer running Windows XP. Microsoft recommends that you closely review these new capabilities to determine if they can assist you to better secure your environment. If you plan to modify the default behavior of the Windows Vista firewall, Microsoft recommends using the Windows Firewall with Advanced Security Group Policy settings to manage client computers running Windows Vista. You can review and configure the new Group Policy settings and management snap-in available for Windows Firewall in the following location in the Group Policy Object Editor: Computer Configuration\Windows Settings\Security Settings\Windows Firewall with Advanced Security Windows Firewall with Advanced Security supports the following environment profiles:
It is important to understand that only one profile is active at a time. If the computer has multiple interfaces and they are connected to multiple network locations, then the evaluation of which profile applies is as follows:
Microsoft recommends enabling Windows Firewall with Advanced Security for all three profiles. In addition to the advanced firewall rules, Windows Firewall also supports connection security rules. Connection security involves authenticating two computers before they begin communications, and securing information sent between the two computers. Windows Firewall with Advanced Security incorporates IPsec technology to support key exchange, authentication, data integrity, and optionally, data encryption. For more information, see the IPsec Web page on Microsoft TechNet. Appendix A, "Security Group Policy Settings," describes all of the prescribed Windows Firewall with Advanced Security settings, and indicates which settings require environment-specific information. Windows Security CenterThe Windows Security Center (WSC) feature runs as a background process on client computers running Windows Vista and Windows XP SP2. In Windows Vista this feature constantly checks and displays the status of four important security categories:
The WSC process also serves as a starting point to access other security-related areas of the computer and provides a single point of reference for you to find security-related support and resources. For example, the WSC provides a link to help users without antivirus software to view offers from vendors that provide antivirus solutions that are compatible with WSC. Microsoft has improved WSC in Windows Vista by including a new category called "Other security settings." This category displays the status of Internet Explorer security settings and User Account Control. Another new category in Windows Vista is "Malware protection," which includes monitoring for antivirus and antispyware software. In addition to the default protection that Windows Vista provides, WSC can monitor multiple vendor security solutions for Windows Firewall, as well as antivirus and antispyware software running on the same client computer, and indicate which solutions are enabled and up to date. For client computers running Windows Vista, WSC provides direct links to vendors that you can use to remediate problems should they arise on the computer. For example, if a third-party antivirus or antispyware solution is turned off or out of date, WSC provides a button that you can click to launch a vendor solution on the computer to correct the problem. In addition, WSC provides links to the vendor Web site so that the user can use to activate or renew a subscription or obtain updates. Knowing when security software is turned off or out-of-date, and the ability to easily download updates, can mean the difference between staying protected as much as possible or becoming vulnerable to malware. WSC runs by default on computers running Windows Vista. The Group Policy settings described in the previous chapter do not contain any settings that modify the default behavior of WSC. However, it is possible for administrators to use Group Policy to ensure that the WSC client UI remains either disabled or enabled for computers that are Domain members. You can review and configure the Group Policy setting available for WSC in the following location in the Group Policy Object Editor: Computer Configuration\Administrative Templates\Windows Components\Security Center The Securitycenter.admx template file contains the XML setting information for this policy setting. The following table describes this setting. Table 2.5 Windows Security Center Setting
This table provides a simple description for this setting. For more information about this setting, see the Explain tab of the setting in the Group Policy Object Editor. Malicious Software Removal ToolThe Microsoft Windows Malicious Software Removal Tool is designed to help remove malware from infected computers. Every month, Microsoft releases a new version of the tool through Microsoft Update, Windows Update, WSUS, and the Microsoft Download Center. Because the Malicious Software Removal Tool is not a fully featured antivirus product, Microsoft strongly recommends that users run antivirus software that will continually detect and remove viruses. When you run the tool, it scans your computer in the background and produces a report if it detects any infections. This tool does not install into the operating system it is scanning. This tool does not have any Group Policy settings in Windows Vista. Risk AssessmentMicrosoft recommends that all computers run a real-time antivirus scanner in addition to the protection services provided as part of Windows Vista. However, even with these protection measures installed, there are two risks that can still apply to an organization:
For these situations, the Malicious Software Removal Tool does provide an additional layer of security to help detect and remove common malicious software. Risk MitigationTo mitigate these risks, Microsoft recommends configuring your client computers to run Automatic Updates so that the Malicious Software Removal Tool will download and run when it is released. If you are considering using the this tool in your environment, the following list highlights some considerations that will help ensure a successful deployment:
For enterprise environments, Microsoft recommends reviewing the Microsoft Knowledge Base article 891716 "Deployment of the Microsoft Windows Malicious Software Removal Tool in an enterprise environment."
Mitigation ProcessTo effectively use the Malicious Software Removal Tool, use the following process. To use this mitigation process
Software Restriction PoliciesSoftware restriction policies provide administrators with a way to identify application software and control its ability to run on local computers. This feature can help protect computers running Windows Vista and Windows XP Professional against known conflicts, and help safeguard them against malicious software, such as viruses and Trojan horse programs. Software restriction policies integrate fully with Active Directory and Group Policy. You can also use this feature on stand-alone computers. You can use software restriction policies to accomplish the following:
Important It is important to thoroughly test all of the policy settings that are discussed in this guide before you deploy them to a production environment. This is especially true when you configure settings for software restriction policies. Mistakes in the design or implementation of this feature can cause considerable user frustration. Software restriction policies have not changed significantly in Windows Vista. For this reason, they are not covered in this guide. For more information about how to design and implement these policies, see "Using Software Restriction Policies to Protect Against Unauthorized Software" on TechNet.
Internet Explorer 7 Defense TechnologiesIt is possible for malicious Web sites to compromise the client computers that you manage. Internet Explorer 7 includes technologies that help prevent the installation of unwanted software, and technologies that help guard against unauthorized transmission of personal data to greatly increase browser security and privacy protection. New security technologies in Internet Explorer 7 include:
Internet Explorer 7 is available for both the Windows Vista and Windows XP operating systems. Windows Vista enhances the Internet Explorer experience. For example, some features available in Internet Explorer 7, such as Protected Mode and Parental Controls, are not available when using the browser on client computer running Windows XP. Also, the Aero user interface is not available through Internet Explorer 7 on computers running Windows XP. Internet Explorer Protected ModeInternet Explorer Protected Mode in Windows Vista adds additional defenses to help enable a safer Internet browsing experience for users. In addition, Protected Mode helps to prevent malicious users from taking over a user’s browser and executing code through elevated privileges. Protected Mode helps reduce previous software vulnerabilities in the extensions for the browser by eliminating the possibility of using them for silent installation of malicious code. Protected Mode uses mechanisms with higher integrity levels in Windows Vista that restrict access to processes, files, and registry keys to accomplish this goal. The Protected Mode application programming interface (API) enables software vendors to develop extensions and add-ons for Internet Explorer that can interact with the file system and registry while the browser is in Protected Mode. In Protected Mode, Internet Explorer 7 runs with reduced permissions to help prevent user or system files or settings from changing without the user’s explicit permission. The new browser architecture also introduces a "broker" process that helps to enable existing applications to elevate out of Protected Mode in a more secure way. This prevents downloading data outside of the low-rights directories in the browser, such as the Temporary Internet Files folder. Protected Mode is enabled by default in Internet Explorer 7 for all security zones except the Trusted Sites zone. However, users can disable the mode, which reduces overall security. For this reason, the Group Policy settings described in the previous chapter enable Protected Mode in all the Web content zones for the browser except the Trusted Site zone, and prevent users from disabling it. You can review and configure the Group Policy setting for Internet Explorer 7 Protected Mode in the following location in the Group Policy Object Editor: Computer Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\<Zone> The following table describes this setting. Table 2.6 Protected Mode Setting
This table provides a simple description for this setting. For more information about this setting, see the Explain tab of the setting in the Group Policy Object Editor. Protected Mode is available for the following security areas and zones in Internet Explorer 7:
ActiveX Opt-inInternet Explorer 7 in Windows Vista offers a powerful new security mechanism for the ActiveX platform to help protect user information and computer systems. ActiveX Opt-in automatically disables all controls that are not explicitly allowed by the user. This mitigates the potential misuse of preinstalled controls. In Windows Vista, the Information Bar prompts users before they can access a previously installed ActiveX control that has not yet been used on the Internet. This notification mechanism enables the user to permit or deny access on a control-by-control basis, which helps further reduces the available surface area for attacks. Malicious users cannot use Web sites to launch automated attacks with ActiveX controls that were never intended to be used on the Internet. Cross-Domain Scripting Attack ProtectionNew cross-domain script barriers help limit the ability of malicious Web sites to manipulate vulnerabilities in other Web sites. For example, before cross-domain scripting attack protection a user might visit a page on a malicious Web site that opens a new browser window containing a legitimate page (such as a banking Web site) that prompts the user to enter account information. This information could then be extracted by a script and made available to the attacker. With Internet Explorer 7, cross-domain scripting attack protection helps to ensure that these types of attacks will fail. Security Status BarThe new Security Status Bar in Internet Explorer 7 helps users quickly differentiate authentic Web sites from suspicious or malicious ones. To provide this information, the Security Status Bar enhances access to digital certificate information that helps identify secure (HTTPS) Web sites. The Security Status Bar provides users with clearer, more prominent visual cues that indicate the safety and identity of Web sites. The technology also supports information about High Assurance certificates to clearly identify secure (HTTPS) sites that have stronger identification measures in place. Phishing FilterPhishing is a technique that many attackers use to trick computer users into revealing personal or financial information through an e-mail message or Web site. Phishers masquerade as a legitimate person or business to deceive people into revealing personal information, such as account passwords and credit card numbers. The Phishing Filter in Internet Explorer 7 advises users about suspicious or known phishing Web sites to help them more safely browse content on the Internet. The filter analyzes Web site content for known phishing techniques, and uses a global network of data sources to assess the trustworthiness of Web sites. Developers who create fraudulent e-mail, online advertisements, and Web sites thrive on lack of communication and limited information sharing. The new Phishing Filter in Internet Explorer 7, which uses an online service that updates the filter several times an hour, consolidates the latest industry information about fraudulent Web sites, and shares it with Internet Explorer 7 customers to help proactively warn and help protect them. The Phishing Filter combines client-side scans for suspicious Web site characteristics with an opt-in online service. It helps protect users from phishing scams in three ways:
Even if the site is unknown to the Phishing Filter service, Internet Explorer 7 can examine the behavior of the site and report to the user if it is doing anything suspicious, such as collecting user information without a Secure Socket Layer (SSL) certificate. In this way, the Phishing Filter helps to prevent a site from collecting user information before it has been officially reported. When users run Internet Explorer 7, the Phishing Filter is configured by default to prompt users to enable or disable the filter. The Group Policy settings described in the previous chapter do not contain any settings that modify this default behavior. However, it is possible for administrators to control the behavior of the Phishing Filter using Group Policy. You can review and configure the Group Policy settings available for the Phishing Filter in the following location in the Group Policy Object Editor: Computer Configuration\Administrative Templates\Windows Components\Internet Explorer The following table describes this setting. Table 2.7 Phishing Filter Setting
This table provides a simple description for this setting. For more information about this setting, see the Explain tab of the setting in the Group Policy Object Editor. Microsoft recommends configuring this setting to Enabled and the operating mode to Automatic. However, administrators should be aware that this configuration automatically causes the browser to send information to Microsoft without prompting the user. Additional Security FeaturesInternet Explorer includes a number of specialized security features that help protect against malware. You can manage all of these settings through Group Policy. You can review and configure the Group Policy Security Features settings available for Internet Explorer 7 in the following location in the Group Policy Object Editor: Computer Configuration\Administrative Templates\Windows Components\Internet Explorer\Security Features This section provides an overview of these settings in Internet Explorer 7. For a full list of all Group Policy settings for Internet Explorer 7, see the Group Policy Object Editor. Note All of the features in this section also work on computers running Internet Explorer 6.0 or later with the following operating systems: Windows XP SP2 and Windows Server 2003 SP1. Add-on ManagementYou can use the policy settings in this section to restrict the add-ons that Internet Explorer 7 can use. The settings in the following table manage add-ons. Table 2.8 Add-on Management Settings
This table provides a simple description for each setting. For more information about a specific setting, see the Explain tab of the setting in the Group Policy Object Editor. Binary Behavior Security RestrictionInternet Explorer contains dynamic binary behaviors: components that encapsulate specific functionality for the HTML elements to which they are attached. You can use the settings in the following table to restrict these behaviors. Table 2.9 Binary Behavior Security Restriction Settings
The previous table provides a simple description for each setting. For more information about a specific setting, see the Explain tab of the setting in the Group Policy Object Editor. Consistent MIME HandlingInternet Explorer uses Multipurpose Internet Mail Extensions (MIME) data to determine file handling procedures for files received through a Web server. The following table provides information about the Group Policy settings for MIME that are available for Internet Explorer 7. Table 2.10 Consistent MIME Handling Settings
Information BarPolicy settings in this section allow you to manage whether the Information Bar is displayed for processes other than the Internet Explorer processes when file or code installation is restricted. By default, the Information Bar displays for Internet Explorer Processes, but not for any process when file or code installs are restricted. The following table provides setting information that you can use to modify this behavior. Table 2.11 Information Bar Settings
Local Machine Zone Lockdown SecurityInternet Explorer places zone restrictions on each Web page it opens, which depend on the location of the Web page (Internet, Intranet, Local Machine zone, and so on). Web pages on the local computer have the fewest security restrictions and reside in the Local Machine zone. Local Machine zone security applies to all local files and content. This feature helps to mitigate attacks when the Local Machine zone is used as an attack vector to load malicious HTML code. Table 2.12 Local Machine Zone Lockdown Security Settings
This table provides a simple description for each setting. For more information about a specific setting, see the Explain tab of the setting in the Group Policy Object Editor. MIME Sniffing Safety FeatureThis feature helps to prevent promotion of a file of one type to a more dangerous file type. The following table lists the settings that are available for this feature. Table 2.13 MIME Sniffing Safety Feature Settings
This table provides a simple description for each setting. For more information about a specific setting, see the Explain tab of the setting in the Group Policy Object Editor. MK Protocol Security RestrictionThe MK Protocol Security Restriction policy setting reduces attack surface area by blocking the MK protocol. If this setting is enabled the resources hosted on the MK protocol will fail. Table 2.14 MK Protocol Security Restriction Settings
This table provides a simple description for each setting. For more information about a specific setting, see the Explain tab of the setting in the Group Policy Object Editor. Network Protocol LockdownYou can configure Internet Explorer 7 to prevent active content obtained through restricted protocols from running in an unsafe manner. This policy setting controls whether restricting content obtained through restricted protocols is prevented or allowed. Table 2.15 Network Protocol Lockdown Settings
This table provides a simple description for each setting. For more information about a specific setting, see the Explain tab of the setting in the Group Policy Object Editor. For each zone, the Network Protocol Lockdown security restriction may be configured to prevent active content obtained through restricted protocols from running in an unsafe manner, either by prompting the user, or simply disabling the content. Note If you set policy for a zone in both Computer Configuration and User Configuration, this action restricts both protocol lists for that zone. Table 2.16 Restricted Protocols for Security Zone Settings
This table provides a simple description for each setting. For more information about a specific setting, see the Explain tab of the setting in the Group Policy Object Editor. Object Caching ProtectionThis policy setting defines whether a reference to an object is accessible when the user navigates within the same domain or to a new domain. Table 2.17 Object Caching Protection Settings
This table provides a simple description for each setting. For more information about a specific setting, see the Explain tab of the setting in the Group Policy Object Editor. Protection From Zone ElevationInternet Explorer places restrictions on each Web page it opens. The restrictions depend on the location of the Web page (Internet, Intranet, Local Machine zone, and so on). For example, Web pages on the local computer have the fewest security restrictions and reside in the Local Machine zone, making the Local Machine zone a prime target for malicious users. Table 2.18 Protection From Zone Elevation Settings
This table provides a simple description for each setting. For more information about a specific setting, see the Explain tab of the setting in the Group Policy Object Editor. Restrict ActiveX InstallThese policy settings apply restrictions to the installation of ActiveX controls. Table 2.19 Restrict ActiveX Install Settings
This table provides a simple description for each setting. For more information about a specific setting, see the Explain tab of the setting in the Group Policy Object Editor. Restrict File DownloadThese policy settings apply restrictions to file downloads that are automatically attempted without a user initiating the download. Table 2.20 Restrict File Download Settings
This table provides a simple description for each setting. For more information about a specific setting, see the Explain tab of the setting in the Group Policy Object Editor. Scripted Windows Security RestrictionsInternet Explorer allows scripts to programmatically open, resize, and reposition windows of various types. The Window Restrictions security feature restricts popup windows and prohibits scripts from displaying windows in which the title and status bars are not visible to the user or obfuscate other windows' title and status bars. Table 2.21 Scripted Windows Security Restrictions Settings
This table provides a simple description for each setting. For more information about a specific setting, see the Explain tab of the setting in the Group Policy Object Editor.
More InformationFor additional information about the new and enhanced security features and technologies in Windows Vista, see the following resources:
|
In This Article
Download Get the Windows Vista Security Guide Solution Accelerator Notifications Feedback |