Part 2 - Privacy and Security Features
Chapter 3: Users' Privacy
Using the privacy features of Microsoft® Internet Explorer 6, you can create a secure environment that protects users' personal information on the Internet and your intranet. This chapter describes these features and explains how you can configure privacy settings.
Chapter 4: Security Zones
This chapter describes security zones, which allow you to effectively manage a secure environment by choosing the level of security for different zones of Internet and intranet content. Read this chapter to learn how to set up security zones within your organization.
Chapter 5: Content Advisor
This chapter describes the Microsoft® Internet Explorer Content Advisor, which allows you to rate the appropriateness of Web content and to control which Web sites your users can visit. This feature can help you create a more secure environment that protects your users from unsuitable content on the Internet.
Chapter 6: Digital Certificates
Microsoft Internet Explorer 6 uses digital certificates to authenticate clients and servers on the Web and to ensure that browser communications are secure. Read this chapter to learn about certificates and about how to configure settings for the certificates that you trust.
Chapter 7: Permission-based Security for Microsoft Virtual Machine
Microsoft Internet Explorer 6 provides comprehensive management and enforcement of Internet and network security. This chapter describes a key feature of security management—permission-based security for Microsoft virtual machine (Microsoft VM). Read this chapter to learn how this security feature can help protect access to information in your organization.