February 19, 1997
With anonymous executables that are being downloaded in increasing numbers from the Internet, administrators face greater risks of viruses or malicious activity on their networks. Microsoft is working to provide administrators with the tools they need to manage these risks.
(Please note that the links indicated by the
symbol below point to servers that are not under Microsoft's control. Please
read Microsoft's official statement regarding other
servers.)
Microsoft Internet Explorer Administrator's Kit (IEAK).
The IEAK allows
administrators to enforce security settings on all desktops in their
organizations. For instance, administrators can control the types of
content downloadable to desktops. Options that administrators can enable or
disable include "Allow downloading of active content," "Enable ActiveX
controls and plug-ins," "Run ActiveX scripts," and "Enable Java programs."
Administrators can also set Internet Explorer's safety level to "High"
corporate-wide, preventing either unsigned or tampered code from being
downloaded to the corporate network.
Microsoft Proxy Server.
Administrators can use the Microsoft Proxy Server in conjunction with
InterScan
WebProtect
from Trend Micro Incorporated
,
to block Java applets, ActiveX objects, unsigned software, and all incoming
software except that from commercial publishers. In addition, WebProtect
scans HTTP files for computer viruses before they reach the LAN.
Firewall products.
Microsoft is working with firewall vendors such as
Trusted Information Systems
to incorporate support for Authenticode technology in products such as the
Gauntlet firewall
.
At a central location, administrators can control the entry of unsigned code
onto the corporate network. Additionally, administrators can specify which
software publishers are trusted, and whose software executables to allow
through the firewall.
© 1997 Microsoft Corporation. All rights reserved. Legal Notices.