IT tutorials
 
Technology
 

Windows 8 : Managing Internet Explorer - Understanding and configuring browser security settings (part 1) - Using Enhanced Protected Mode

6/29/2014 4:33:56 AM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

1. Managing new Internet Explorer 10 security settings

Internet Explorer 10 includes a number of new security features designed to make the browsing experience more secure for Windows 8 users. Because web browsing is a common vector by which malware is introduced into an organization, new security features can help these organizations remain more secure. Three new security features are included in Internet Explorer 10.

Understanding enhanced memory protection

Through the use of creative attacks, attackers have discovered commonalities and patterns in system memory that make it possible to exploit them easily. Over time, Internet Explorer has added features to protect against this kind of activity. Two major memory-protection features have been added to Internet Explorer 10.

  • High Entropy Address Space Layout Randomization (HEASLR) Technically, this feature is part of Windows 8, but Internet Explorer 10 uses it fully for security gains. This feature employs the 64-bit nature of processes to increase the entropy of physical RAM on a computer. The result: attackers cannot easily predict the locations at which specific code elements will reside, making it more difficult to determine a pattern.

  • ForceASLR Not all Internet Explorer modules and add-ons were compiled using the option that allows the module or add-on code to be randomized in memory for maximum protection against predictive attacks. Forced Address Space Layout Randomization (ASLR) is a new feature in Windows 8 that Internet Explorer 10 uses to instruct the system to randomize the memory location of all modules and add-ons.

Understanding the HTML5 sandbox attribute

Inline Frames (IFrames) are a method by which HTML pages can be embedded inside other HTML pages. IFrames are often used to embed advertising content into webpages. The content in an IFrame doesn’t have to come from the site that someone is browsing. In fact, it’s common for the content in an IFrame to be sourced from a different site. IFrames have been used to distribute code that redirects unsuspecting people to malicious websites.

Internet Explorer 10 can help protect users against a number of IFrame-related exploits but only when web designers specifically include code that enables this new feature. When this feature, called the HTML5 sandbox attribute, is enabled, new security restrictions are put into place for IFrames that contain untrusted content. Among other restrictions, the HTML5 sandbox attribute has the following primary restrictions:

  • When content is in this sandbox, it cannot open new browser windows.

  • Links inside the sandboxed content cannot open in new windows.

  • Sandboxed content cannot submit form data.

In other words, information inside the sandbox cannot be manipulated in the same way as information outside. The sandbox is intended to be a restricted area.

As an administrator, you don’t control implementation of this feature directly. Rather, it works only when web developers include special code in their websites that turns this feature on.

Using Enhanced Protected Mode

Internet Explorer Protected Mode was originally introduced in Internet Explorer 7 and implements a policy based on the principle of least privilege. Under this principle, an application such as Internet Explorer is allowed access only to system elements and locations that are necessary for the application to complete its task. This limits the ability to exploit Internet Explorer to perform malicious activity on a host.

Internet Explorer 10 in Windows 8 adds restrictions to protect host systems further. These additional restrictions include:

  • 64-bit processes For systems that support running 64-bit processes, Internet Explorer 10 uses 64-bit processes for many operations. 64-bit processes carry much larger memory address spaces. The huge memory space provided by 64-bit address spaces makes it more difficult for attacks against process memory to be successful. Touch-optimized Internet Explorer automatically runs in 64-bit mode on 64-bit computers to take advantage of this enhancement. One reason that this variation of Internet Explorer can easily run in a 64-bit process is this variation’s inability to run add-ons in Internet Explorer. With older versions of Internet Explorer, general guidance recommended the use of the 32-bit edition, even on 64-bit machines, due to add-on compatibility issues.

  • Reduced execution context When you run a program on your computer, that program runs in the context of your user account and has access to all the same things that you do, including your personal files. With Enhanced Protected Mode, Internet Explorer must request your permission before it can access files from locations that contain your personal information.

The Enhanced Protected Mode in Internet Explorer 10 is not enabled by default, as shown in Figure 1, in which there is no check box next to Enable Enhanced Protected Mode. To enable this option, complete the following steps:

  1. Open Internet Explorer on the desktop, and then press Alt+T. Choose Internet Options from the menu or open it from Control Panel.

  2. Select the Advanced tab.

  3. From the Advanced tab, scroll down until you see Enable Enhanced Protected Mode.

  4. Select the check box next to that option and click or tap OK.

    You must restart Internet Explorer for Enhanced Protected Mode to take effect.

Enabling Enhanced Protected Mode

Figure 1. Enabling Enhanced Protected Mode

 
Others
 
- Microsoft Exchange Server 2013 : Mailbox management - Reconnecting mailboxes
- Microsoft Exchange Server 2013 : Mailbox management - Removing or disabling mailboxes
- Microsoft Exchange Server 2013 : Mailbox management - Setting mailbox quotas
- Microsoft Exchange Server 2013 : Mailbox management - Mailbox resources provisioning management agent
- Windows 8 : Configuring Internet Explorer 10 (part 4) - Managing Internet Explorer settings by using Group Policy
- Windows 8 : Configuring Internet Explorer 10 (part 3) - Controlling Internet Explorer Start screen tile behavior, Configuring Internet Explorer 10
- Windows 8 : Configuring Internet Explorer 10 (part 2) - Configuring the startup Internet Explorer
- Windows 8 : Configuring Internet Explorer 10 (part 1) - Managing two Internet Explorer experiences
- Windows Server 2012 : Administering Active Directory objects using ADAC (part 4) - Common administration tasks - Creating users
- Windows Server 2012 : Administering Active Directory objects using ADAC (part 3) - Common administration tasks - Creating organizational units
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us