SlideShare une entreprise Scribd logo
1  sur  42
Internet Explorer® 7 & 8

    Joel Semeniuk
    Imaginet
    JoelS@Imaginets.com
    Microsoft MVP Team System


1
Think About The Browser Two Ways

                                                Window To Public
          Platform for LOB Apps
                                                 Facing Website

        Maintain     Compatible
        Secure IT     With LOB
                                                      Build
      Environment      Apps
                                  Create User
                                                    Customer
                                  Connection
                                                      Trust
      Manageable      Reliable
                                         Compatible
                                         With My Site
              Does not
             become cost
                center


2
Hardwired Dependencies are Inflexible


                       Data, User settings


                       Applications


                       OS


                       Hardware



3
Server



                       Data, User settings


                       Applications
    Browser Becomes
        The Platform
                       Browser
                       OS


                       Hardware



4
More Reliance on Web Apps
                         Customer
                        Management


          Reporting                      Travel



                        PC Based
                      Browser Based               Research
      Workflow



                                        Purchasing
            E-Mail



                         Personal Use



5
6 Reasons You (Should) Care About The Browser

          Customer        • Your company has a website and does business
                            on the web
         Connection
                          • Your business on the web relies on customer
        Customer Trust      trust that the web is a safe place to do business

                          • You care about the integrity of your business
           Security         data, infrastructure and PCs

        Compatibility &   • Your company uses internal web apps and is
                            building or buying more
          Standards
                          • Your users probably spend 2 hours or more in the
        Supportability      browser every day

                          • Keeping up to date with browser patches and
        Manageability       updates is hard

6
7
Accelerators
    Ready Access to Online Services You Use
    Most
      Email
      Blog
      Shop
      Map
      Share
      Translate
      Find
      Define


8
Web Slices
    Rich, Real-time Integration of Online Services




                                        Zune




9
Improved Search
     Suggestions with Results from History
     Visual Search Returns Provider
     Quickly Specify SearchImages with
     Configure Multiple Search ProvidersResults




10
Features
      Smart Address Bar
      Enhanced Favorites
      Redesigned New Tab
      Page
      Tab Grouping
      Better Back Button
      1-Click Favorites




11
Reaching Beyond The Page


     Accelerators
     Web Slices
     Visual Search and Search Suggestions



12
13
Customer Trust is Under Attack
              Volume




      Type                     Sophistication

              Customer Trust
14
IE7 Contribution To Building Trust
     Phishing Filter



                                        1M phishing
                                        attempts blocked
                                        per week




     Extended Validation Certificates
                                        5000 issued
                                        to date

15
What's New In Trust in IE 8?
                                              Updated

                              Safety Filter
                              Expanding scope
                              to incorporate
                              new threats



                              Domain Name
                              Highlighting        New

                              Helps the user
                              identify real
                              domain name
16
SmartScreen® Filter
     SmartScreen® Filter
       Increases anti-phishing and anti-malware
       protection
       Allows you to report unsafe sites to Microsoft




17
InPrivateTM Browsing


     Enhanced Delete
     Browsing History




                            InPrivateTM Blocking

18
Internet Explorer 7 : Phishing Filter
     Internet Explorer 8 : SmartScreen™ Filter




19
20
Data, Network and PC Integrity
     Your Risks
Targeted Phishing Attack                                  Compromised
                                                           Partner Site
                                   Firewall

                                 Spam Filter




                                   Network


                           PCs                 Data and
                                               Systems




     Exploit in Common
      ActiveX Control
21
Data, Network and PC Integrity
     Internet Explorer 7 Features
                Targeted Phishing Attack
                • Phishing Filter identifies known phishing sites and blocks access
                • International Domain Name feature helps ensure users aren’t
                tricked by international characters



                Exploit in Common ActiveX® Control
                • ActiveX Opt-in ensures users approve ActiveX control for use.
                User account can now be standard rather than admin
                • ActiveX Kill Bits allow ActiveX control with known flaw to be
                prevented from loading in Internet Explorer


                Compromised Partner Site
                • No additional protection



22
Data, Network and PC Integrity
     New in Internet Explorer 8
                Targeted Phishing Attack
                • Phishing Filter evolves to SmartScreen™ Filter to encompass
                malware threats
                • Domain Name Identification highlights the real domain you’re
                browsing on


               Exploit in Common ActiveX Control
               • Per-user ActiveX contains risk to single user account.
               • Per-site ActiveX allows developer restrict control to only their
               site/app



               Compromised Partner Site
               • Cross Domain Requests object ensures data is only shared after a
               mutual validation of identity
               • Cross-Site Scripting Filter helps protect users against a
               compromised site
23
Security Enhancements
     Domain Highlighting
     SmartScreen Filter
     Reporting Sites




24
Internet Explorer 8 : Cross-Site Scripting
     Filter




25
26
Today Developers Build Multiple
     Versions of Websites
            Page Built For Internet                    Page1. IdentifyInternet
                                                            Built For browser
            Explorer 6                                 Explorer 7
                                                           2. Serve right page


                             Page Built To Standards




                                       I’m Safari
                                      I’m Firefox
       I’m IE6                                                          I’m IE7
                                                                                  7
                 6
27
Internet Explorer 8 Interoperability


                                               1. Identify browser
                                               2. Serve right page


                 Page Built To Standards




                          I’m Safari
                         I’m Firefox
                            I’m IE8
                                           8
28
What Did We Learn?
              Safari, Firefox and IE8 all display the same way
              • Decide when your business can afford to stop supporting IE6 and
              IE7 to save your developers time
              • But be aware IE6, IE7 and IE8 look the same to most web servers
        8     so be sure to send the right page to IE8


              IE8 will display pages the same way as IE7
              • But you need to tell IE8 to display that way
              • See http://msdn.microsoft.com/iecompat to learn how to add
              the site compatibility META tag to your pages/server
        7&8


              IE6 is IE6
              • Get tips on migration from IE6 to IE7 at
              http://msdn.microsoft.com/iecompat
        6
29
30
What Did We Learn So Far?



      There Are     Your Users
                                   You Need A
        Many       Are Spending
                                  Browser Built
      Dangers on   More Time In
                                  For Business
       the Web     The Browser




31
Internet Explorer Fundamentals
            Group Policy (over 1300 in IE8)
            • Control browser features, ex : Turn on/off Phishing Filter
            • Configure browser features, ex : home page, favorites
            • Enforce security settings, ex: trusted sites
            • New features exposed through group policy


            Support Infrastructure
            • Pay per incident support available to everyone
            • Support agreements for Windows OS include support for
            Internet Explorer
            • Professional support organization provides issue resolution


            New in IE8 – Crash Recovery
            • Tabs isolated into separate processes – one tab crashing does not
            bring down the browser
            • Crash recovery reloads tabs when they crash
32
33
Browsers Need To Be Updated
                         Internet
              Firefox
                         Explorer


                         Scheduled
             13 point
                          monthly
              releases
                          updates
             since Feb
                          on patch
                2007
                          Tuesday




34
Control Over Browser Updates

        Application
                     • Will our apps still work?
       Compatibility


                        • Can I choose when it is
          Timing          delivered in my environment?


           User         • Will it require user interaction?
        Experience      • Will it require a reboot?

35
Internet Explorer 7

         Application    • See
                          http://msdn.microsoft.com/iecompat
        Compatibility

                        • Scheduled, notified updates on patch
           Timing         Tuesday
                        • Control distribution through WSUS



            User        • Many updates require a reboot (system
                          level components)
         Experience

36
Internet Explorer 8

         Application • META tag/group policy provides
                       compatibility for Internet
        Compatibility  Explorer 7 apps


                        • Scheduled updates like Internet
           Timing         Explorer 7



            User        • Slipstream
         Experience

37
IE8 META tag




38
Efficient Image Management Using
     Internet Explorer 8
       Using Slipstream you can :
         Update your standard desktop image with Internet
         Explorer 8 + patches without needing reboot or user
         interaction
         Add patches/new browser with less effort than
         ImageX and other image management software
       Technology
         Use WAIK (Windows Automated Installation Toolkit)
         to integrate Internet Explorer 8 and patches



39
For Developers




40
6 Reasons You (Should) Care About The Browser

           Customer        • Reach beyond the page with Accelerators, Web
                             Slices and Visual Search
          Connection
                           • Highlight safe browsing features like Safety Filter,
         Customer Trust      EV certificates and Domain Name Identification

                           • Turn on safer browsing features for your users
            Security         and in your web apps

         Compatibility &   • Use the “META” tag and plan for standards
           Standards
                           • Broad group policy support, crash recovery and
         Supportability      professional support

                           • Regular, scheduled patches, managed
         Manageability       distribution, easier image management

41
© 2008 Microsoft Corporation. All rights reserved. Microsoft, InPrivate, Internet Explorer, SmartScreen, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S.
                                                                                                           and/or other countries.
     The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should
      not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS,
                                                                                 IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.




47

Contenu connexe

Tendances

SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010
SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010 SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010
SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010 Michael Noel
 
Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsOlivier Potonniée
 
HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010Michael Noel
 
“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with Everything“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with EverythingDave Hay
 
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010Michael Noel
 
Sybase Afaria için Samsun Advanced Enterprise Server Farkları
Sybase Afaria için Samsun Advanced Enterprise Server FarklarıSybase Afaria için Samsun Advanced Enterprise Server Farkları
Sybase Afaria için Samsun Advanced Enterprise Server FarklarıSybase Türkiye
 
08 asp.net session11
08 asp.net session1108 asp.net session11
08 asp.net session11Niit Care
 
Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud finalOracleIDM
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1OracleIDM
 
Your App is been deployed behind the Firewall! Now What?
Your App is been deployed behind the Firewall! Now What?Your App is been deployed behind the Firewall! Now What?
Your App is been deployed behind the Firewall! Now What?Dennis Reumer
 
Windows 7 Developer Overview
Windows 7 Developer OverviewWindows 7 Developer Overview
Windows 7 Developer OverviewDave Bost
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancementsNarenda Wicaksono
 
Mobile Application Security – Effective methodology, efficient testing!
Mobile Application Security – Effective methodology, efficient testing!Mobile Application Security – Effective methodology, efficient testing!
Mobile Application Security – Effective methodology, efficient testing!espheresecurity
 
Mobile application security – effective methodology, efficient testing! hem...
Mobile application security – effective methodology, efficient testing!   hem...Mobile application security – effective methodology, efficient testing!   hem...
Mobile application security – effective methodology, efficient testing! hem...owaspindia
 
Web 2 And Application Delivery Public
Web 2 And Application Delivery PublicWeb 2 And Application Delivery Public
Web 2 And Application Delivery PublicLori MacVittie
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingOKsystem
 
Protecting the identities of your website customers
Protecting the identities of your website customers Protecting the identities of your website customers
Protecting the identities of your website customers Symantec Website Security
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentRamesh Nagappan
 

Tendances (20)

SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010
SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010 SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010
SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010
 
OpenSSO Tech Overview Aquarium
OpenSSO Tech Overview AquariumOpenSSO Tech Overview Aquarium
OpenSSO Tech Overview Aquarium
 
Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applications
 
HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010
 
“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with Everything“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with Everything
 
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010
 
Sybase Afaria için Samsun Advanced Enterprise Server Farkları
Sybase Afaria için Samsun Advanced Enterprise Server FarklarıSybase Afaria için Samsun Advanced Enterprise Server Farkları
Sybase Afaria için Samsun Advanced Enterprise Server Farkları
 
08 asp.net session11
08 asp.net session1108 asp.net session11
08 asp.net session11
 
Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud final
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
Your App is been deployed behind the Firewall! Now What?
Your App is been deployed behind the Firewall! Now What?Your App is been deployed behind the Firewall! Now What?
Your App is been deployed behind the Firewall! Now What?
 
Windows 7 Developer Overview
Windows 7 Developer OverviewWindows 7 Developer Overview
Windows 7 Developer Overview
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
 
Mobile Application Security – Effective methodology, efficient testing!
Mobile Application Security – Effective methodology, efficient testing!Mobile Application Security – Effective methodology, efficient testing!
Mobile Application Security – Effective methodology, efficient testing!
 
Mobile application security – effective methodology, efficient testing! hem...
Mobile application security – effective methodology, efficient testing!   hem...Mobile application security – effective methodology, efficient testing!   hem...
Mobile application security – effective methodology, efficient testing! hem...
 
Web 2 And Application Delivery Public
Web 2 And Application Delivery PublicWeb 2 And Application Delivery Public
Web 2 And Application Delivery Public
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
Protecting the identities of your website customers
Protecting the identities of your website customers Protecting the identities of your website customers
Protecting the identities of your website customers
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environment
 

Similaire à Fy09 Sask Tel Learn It Ie7 And Ie8 Joel Semeniuk

Web browser and Security Threats
Web browser and Security ThreatsWeb browser and Security Threats
Web browser and Security ThreatsHTS Hosting
 
Keynote Client Connectivity And The Cloud
Keynote Client Connectivity And The CloudKeynote Client Connectivity And The Cloud
Keynote Client Connectivity And The CloudGoogleTecTalks
 
Browser Compete - IE8 FireStarter
Browser Compete - IE8 FireStarterBrowser Compete - IE8 FireStarter
Browser Compete - IE8 FireStarterMithun T. Dhar
 
Xfocus xcon 2008_aks_oknock
Xfocus xcon 2008_aks_oknockXfocus xcon 2008_aks_oknock
Xfocus xcon 2008_aks_oknockownerkhan
 
Client Continuum Dec Fy09
Client Continuum Dec Fy09Client Continuum Dec Fy09
Client Continuum Dec Fy09Martha Rotter
 
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...TrustBearer
 
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With EaseThe New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With EaseInductive Automation
 
SharePoint Saturday The Conference 2011 - Extranets & Claims Authentication
SharePoint Saturday The Conference 2011 - Extranets & Claims AuthenticationSharePoint Saturday The Conference 2011 - Extranets & Claims Authentication
SharePoint Saturday The Conference 2011 - Extranets & Claims AuthenticationBrian Culver
 
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Michael Noel
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012gaborvodics
 
Federated Identity Architectures Integrating With The Cloud
Federated Identity Architectures   Integrating With The CloudFederated Identity Architectures   Integrating With The Cloud
Federated Identity Architectures Integrating With The Cloudrsnarayanan
 
Cloud Security Primer - F5 Networks
Cloud Security Primer - F5 NetworksCloud Security Primer - F5 Networks
Cloud Security Primer - F5 NetworksHarry Gunns
 
Keynote Systems - Mobile Solutions Overview Presentation
Keynote Systems - Mobile Solutions Overview PresentationKeynote Systems - Mobile Solutions Overview Presentation
Keynote Systems - Mobile Solutions Overview Presentationvprathap
 
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease Inductive Automation
 
IBM MobileFirst - Hybrid Application Development with Worklight
IBM MobileFirst - Hybrid Application Development with WorklightIBM MobileFirst - Hybrid Application Development with Worklight
IBM MobileFirst - Hybrid Application Development with WorklightIBIZZ
 
Vfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporterVfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reportervfmindia
 
Customized Browser Displaying Multiple Sessions in a Carousel View
Customized Browser Displaying Multiple Sessions in a Carousel ViewCustomized Browser Displaying Multiple Sessions in a Carousel View
Customized Browser Displaying Multiple Sessions in a Carousel ViewMike Taylor
 

Similaire à Fy09 Sask Tel Learn It Ie7 And Ie8 Joel Semeniuk (20)

Web browser and Security Threats
Web browser and Security ThreatsWeb browser and Security Threats
Web browser and Security Threats
 
Windows 7 For Itpro
Windows 7 For ItproWindows 7 For Itpro
Windows 7 For Itpro
 
Keynote Client Connectivity And The Cloud
Keynote Client Connectivity And The CloudKeynote Client Connectivity And The Cloud
Keynote Client Connectivity And The Cloud
 
Browser Compete - IE8 FireStarter
Browser Compete - IE8 FireStarterBrowser Compete - IE8 FireStarter
Browser Compete - IE8 FireStarter
 
Xfocus xcon 2008_aks_oknock
Xfocus xcon 2008_aks_oknockXfocus xcon 2008_aks_oknock
Xfocus xcon 2008_aks_oknock
 
Web Sphere Portal
Web Sphere PortalWeb Sphere Portal
Web Sphere Portal
 
Client Continuum Dec Fy09
Client Continuum Dec Fy09Client Continuum Dec Fy09
Client Continuum Dec Fy09
 
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
 
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With EaseThe New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
 
SharePoint Saturday The Conference 2011 - Extranets & Claims Authentication
SharePoint Saturday The Conference 2011 - Extranets & Claims AuthenticationSharePoint Saturday The Conference 2011 - Extranets & Claims Authentication
SharePoint Saturday The Conference 2011 - Extranets & Claims Authentication
 
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012
 
Federated Identity Architectures Integrating With The Cloud
Federated Identity Architectures   Integrating With The CloudFederated Identity Architectures   Integrating With The Cloud
Federated Identity Architectures Integrating With The Cloud
 
Cloud Security Primer - F5 Networks
Cloud Security Primer - F5 NetworksCloud Security Primer - F5 Networks
Cloud Security Primer - F5 Networks
 
Web security 2012
Web security 2012Web security 2012
Web security 2012
 
Keynote Systems - Mobile Solutions Overview Presentation
Keynote Systems - Mobile Solutions Overview PresentationKeynote Systems - Mobile Solutions Overview Presentation
Keynote Systems - Mobile Solutions Overview Presentation
 
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
 
IBM MobileFirst - Hybrid Application Development with Worklight
IBM MobileFirst - Hybrid Application Development with WorklightIBM MobileFirst - Hybrid Application Development with Worklight
IBM MobileFirst - Hybrid Application Development with Worklight
 
Vfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporterVfm bluecoat proxy sg solution with web filter and reporter
Vfm bluecoat proxy sg solution with web filter and reporter
 
Customized Browser Displaying Multiple Sessions in a Carousel View
Customized Browser Displaying Multiple Sessions in a Carousel ViewCustomized Browser Displaying Multiple Sessions in a Carousel View
Customized Browser Displaying Multiple Sessions in a Carousel View
 

Dernier

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Dernier (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Fy09 Sask Tel Learn It Ie7 And Ie8 Joel Semeniuk

  • 1. Internet Explorer® 7 & 8 Joel Semeniuk Imaginet JoelS@Imaginets.com Microsoft MVP Team System 1
  • 2. Think About The Browser Two Ways Window To Public Platform for LOB Apps Facing Website Maintain Compatible Secure IT With LOB Build Environment Apps Create User Customer Connection Trust Manageable Reliable Compatible With My Site Does not become cost center 2
  • 3. Hardwired Dependencies are Inflexible Data, User settings Applications OS Hardware 3
  • 4. Server Data, User settings Applications Browser Becomes The Platform Browser OS Hardware 4
  • 5. More Reliance on Web Apps Customer Management Reporting Travel PC Based Browser Based Research Workflow Purchasing E-Mail Personal Use 5
  • 6. 6 Reasons You (Should) Care About The Browser Customer • Your company has a website and does business on the web Connection • Your business on the web relies on customer Customer Trust trust that the web is a safe place to do business • You care about the integrity of your business Security data, infrastructure and PCs Compatibility & • Your company uses internal web apps and is building or buying more Standards • Your users probably spend 2 hours or more in the Supportability browser every day • Keeping up to date with browser patches and Manageability updates is hard 6
  • 7. 7
  • 8. Accelerators Ready Access to Online Services You Use Most Email Blog Shop Map Share Translate Find Define 8
  • 9. Web Slices Rich, Real-time Integration of Online Services Zune 9
  • 10. Improved Search Suggestions with Results from History Visual Search Returns Provider Quickly Specify SearchImages with Configure Multiple Search ProvidersResults 10
  • 11. Features Smart Address Bar Enhanced Favorites Redesigned New Tab Page Tab Grouping Better Back Button 1-Click Favorites 11
  • 12. Reaching Beyond The Page Accelerators Web Slices Visual Search and Search Suggestions 12
  • 13. 13
  • 14. Customer Trust is Under Attack Volume Type Sophistication Customer Trust 14
  • 15. IE7 Contribution To Building Trust Phishing Filter 1M phishing attempts blocked per week Extended Validation Certificates 5000 issued to date 15
  • 16. What's New In Trust in IE 8? Updated Safety Filter Expanding scope to incorporate new threats Domain Name Highlighting New Helps the user identify real domain name 16
  • 17. SmartScreen® Filter SmartScreen® Filter Increases anti-phishing and anti-malware protection Allows you to report unsafe sites to Microsoft 17
  • 18. InPrivateTM Browsing Enhanced Delete Browsing History InPrivateTM Blocking 18
  • 19. Internet Explorer 7 : Phishing Filter Internet Explorer 8 : SmartScreen™ Filter 19
  • 20. 20
  • 21. Data, Network and PC Integrity Your Risks Targeted Phishing Attack Compromised Partner Site Firewall Spam Filter Network PCs Data and Systems Exploit in Common ActiveX Control 21
  • 22. Data, Network and PC Integrity Internet Explorer 7 Features Targeted Phishing Attack • Phishing Filter identifies known phishing sites and blocks access • International Domain Name feature helps ensure users aren’t tricked by international characters Exploit in Common ActiveX® Control • ActiveX Opt-in ensures users approve ActiveX control for use. User account can now be standard rather than admin • ActiveX Kill Bits allow ActiveX control with known flaw to be prevented from loading in Internet Explorer Compromised Partner Site • No additional protection 22
  • 23. Data, Network and PC Integrity New in Internet Explorer 8 Targeted Phishing Attack • Phishing Filter evolves to SmartScreen™ Filter to encompass malware threats • Domain Name Identification highlights the real domain you’re browsing on Exploit in Common ActiveX Control • Per-user ActiveX contains risk to single user account. • Per-site ActiveX allows developer restrict control to only their site/app Compromised Partner Site • Cross Domain Requests object ensures data is only shared after a mutual validation of identity • Cross-Site Scripting Filter helps protect users against a compromised site 23
  • 24. Security Enhancements Domain Highlighting SmartScreen Filter Reporting Sites 24
  • 25. Internet Explorer 8 : Cross-Site Scripting Filter 25
  • 26. 26
  • 27. Today Developers Build Multiple Versions of Websites Page Built For Internet Page1. IdentifyInternet Built For browser Explorer 6 Explorer 7 2. Serve right page Page Built To Standards I’m Safari I’m Firefox I’m IE6 I’m IE7 7 6 27
  • 28. Internet Explorer 8 Interoperability 1. Identify browser 2. Serve right page Page Built To Standards I’m Safari I’m Firefox I’m IE8 8 28
  • 29. What Did We Learn? Safari, Firefox and IE8 all display the same way • Decide when your business can afford to stop supporting IE6 and IE7 to save your developers time • But be aware IE6, IE7 and IE8 look the same to most web servers 8 so be sure to send the right page to IE8 IE8 will display pages the same way as IE7 • But you need to tell IE8 to display that way • See http://msdn.microsoft.com/iecompat to learn how to add the site compatibility META tag to your pages/server 7&8 IE6 is IE6 • Get tips on migration from IE6 to IE7 at http://msdn.microsoft.com/iecompat 6 29
  • 30. 30
  • 31. What Did We Learn So Far? There Are Your Users You Need A Many Are Spending Browser Built Dangers on More Time In For Business the Web The Browser 31
  • 32. Internet Explorer Fundamentals Group Policy (over 1300 in IE8) • Control browser features, ex : Turn on/off Phishing Filter • Configure browser features, ex : home page, favorites • Enforce security settings, ex: trusted sites • New features exposed through group policy Support Infrastructure • Pay per incident support available to everyone • Support agreements for Windows OS include support for Internet Explorer • Professional support organization provides issue resolution New in IE8 – Crash Recovery • Tabs isolated into separate processes – one tab crashing does not bring down the browser • Crash recovery reloads tabs when they crash 32
  • 33. 33
  • 34. Browsers Need To Be Updated Internet Firefox Explorer Scheduled 13 point monthly releases updates since Feb on patch 2007 Tuesday 34
  • 35. Control Over Browser Updates Application • Will our apps still work? Compatibility • Can I choose when it is Timing delivered in my environment? User • Will it require user interaction? Experience • Will it require a reboot? 35
  • 36. Internet Explorer 7 Application • See http://msdn.microsoft.com/iecompat Compatibility • Scheduled, notified updates on patch Timing Tuesday • Control distribution through WSUS User • Many updates require a reboot (system level components) Experience 36
  • 37. Internet Explorer 8 Application • META tag/group policy provides compatibility for Internet Compatibility Explorer 7 apps • Scheduled updates like Internet Timing Explorer 7 User • Slipstream Experience 37
  • 39. Efficient Image Management Using Internet Explorer 8 Using Slipstream you can : Update your standard desktop image with Internet Explorer 8 + patches without needing reboot or user interaction Add patches/new browser with less effort than ImageX and other image management software Technology Use WAIK (Windows Automated Installation Toolkit) to integrate Internet Explorer 8 and patches 39
  • 41. 6 Reasons You (Should) Care About The Browser Customer • Reach beyond the page with Accelerators, Web Slices and Visual Search Connection • Highlight safe browsing features like Safety Filter, Customer Trust EV certificates and Domain Name Identification • Turn on safer browsing features for your users Security and in your web apps Compatibility & • Use the “META” tag and plan for standards Standards • Broad group policy support, crash recovery and Supportability professional support • Regular, scheduled patches, managed Manageability distribution, easier image management 41
  • 42. © 2008 Microsoft Corporation. All rights reserved. Microsoft, InPrivate, Internet Explorer, SmartScreen, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. 47