Security Zones and Permission-Based Security for Microsoft Virtual Machine

Cc940385.chap_07(en-us,TechNet.10).gif Cc940385.image(en-us,TechNet.10).gif

Microsoft Internet Explorer 5 provides comprehensive management and enforcement of Internet and network security. This chapter describes two key features of security management: security zones and permission-based security for Microsoft Virtual Machine. Read this chapter to learn how these security features can help protect access to individuals and information in your organization.

In This Chapter

Understanding Security Zones

Setting Up Security Zones

Understanding Permission-Based Security for Microsoft Virtual Machine

Setting Up Java Custom Security

See Also

  • For more information about configuring digital certificates, see Chapter 6 , "Digital Certificates."

  • For more information about Internet Explorer features that help ensure user privacy, see Chapter 8 , "Content Ratings and User Privacy."

  • For more information about planning user security before Internet Explorer installation, see Chapter 9 , "Planning the Deployment."

  • For more information about Internet Explorer system policies and restrictions that enable you to preconfigure security settings, see Appendix E , "Setting System Policies and Restrictions."

.