IEController is a handy tool that allows you to:
- Execute/monitor access
- Control the execution of ActiveX controls
- Control the execution of scripts, programs
- Control requests to restrict and control files
- Prevent ads
- Log data traffic
And what is really nice about IEController is that it isn’t an installable application. Based on your settings, all this tool does is edit your Windows Registry file and create an icon for that particular instance of IE. You can also use IEController for any application that accesses similar protocols and tools as does IE. This means you can also secure other browsers as well, which is very handy. If it sounds a bit confusing, it’s not, once you see it in action. Let’s see how this works.
Step 1: Download and extract
The first thing you have to do is download the IEController Zip File and extract this file somewhere on your system. Unpack that file and you will see the IEController icon. You can always pin this icon to the start menu for quick access.
Step 2: Run IEController
Double click on the IEController icon to start up the application. The application consists of a single window housing multiple tabs (Figure A). Each of these tabs handles a different aspect of IE security.
You will only see this menu the first time you open an application with IEController. So you will want to make sure you choose your settings wisely.
Step 3: Walk through the tabs
There are nine tabs, seven of which directly impact the security of Internet Explorer (with the only exceptions being the Configuration and the Log tab). The tabs are as follows:
This tab is where you set up the icons you will use for your various applications. After you make all of your configurations you will come back to this tab and then click the Create Configuration Icon button which will then place an icon for that configuration on your desktop.
This one is the big one. As you can see (Figure B), this tab can control a number of the less secure IE features.
What you are looking at is the default ActiveX settings in IEController. Add or remove them as per your requirements.
If you click on the Expert Settings button a new window will open allowing you to create unique allowed and disallowed objects. For this you will need the objects CLSID.
From this tab (Figure C) you can control which external applications IE can access. Although the list seems a bit on the small side, you can click on the Expert Settings button and create your own application listings to select from.
To create your own, click the Expert Settings, then choose either black or white list, right click the pane associated with the list you want to use and select New Entry. The rest is simple.
From this tab (Figure D), you can control what files IE can access. For the most part, this should be self-explanatory.
Just remember that anything checked is allowed. By default all items are set to allow.
This tab (Figure E) has some very interesting and powerful options available. From inbound to outbound TCP connections, to Verisign redirects and ad servers you can control seriously contain IE from this tab.
Click the Expert Settings button and you can even create black/white lists of sites that IE can and cannot connect to.
From this tab (Figure F) you can set keywords associated with sensitive data in order to prevent certain pieces of information from being transmitted unknowingly. In order to set this you have to click the check box and then manually add keywords for IE to watch for.
To create a new entry on this tab, right-click the blank area and select New Entry from the menu.
This tab (Figure G) is quite important. From here you can disallow write access to the registry. That alone is worth the price of admission. Of course this tab allows for the configuration of more than just registry settings. You can also set this up such that IE cannot modify the Internet connection as well as register programs for autostart.
By default IE has write access to the registry. If you want to change this, click the box next to Disable write access to registry.
The final tab (Figure H) offers a few settings not related to any other tab. I have yet to use any configuration from this tab, but you might want to change the System logging function to Disallow to aid in the prevention of spyware.
Do not uncheck the Always notify dangerous actions or else you risk bad things happening without you knowing.
Step 4: Create your icon
When you have finally finished your configuration, go back to the Configuration tab and click the Create Configuration Icon and then click the Start button. A new icon will appear on your desktop and IE will start with your configuration options set. Now, every time you start IE from that icon it will run with the same configuration. If, however, you run IE from the normal means, it will run with the default configuration.
That’s it! You’ve set up IE as a more secure browser. You can also do this with other applications by simply dragging their icon onto the IEController icon. The IEController application will start and set options for that application. Just remember, you only see that configuration window the FIRST time you run an application with IEController.
IEController is certainly worth a look if you must use Internet Explorer. When you set IE up with this tool you will find it far more secure than the default.