How do I secure Internet Explorer with IEController?

There are plenty of schools of thought on this, but ultimately there are situations where IE is a must-use application. This could be per your company policy or even due to specific Web-site needs. Regardless, there are times when you have to (or want to) use Internet Explorer. For those instances, you will want to make sure that IE is operating as safe as possible. Of course the definition of “safe” is very fluid. Thankfully there are tools available that allow for such fluidity, while still helping to secure a very popular Web browser.
  • Date: May 18th, 2010
  • Author: Jack Wallen
  • IEController is a handy tool that allows you to:

    • Execute/monitor access
    • Control the execution of ActiveX controls
    • Control the execution of scripts, programs
    • Control requests to restrict and control files
    • Prevent ads
    • Log data traffic

    And what is really nice about IEController is that it isn’t an installable application. Based on your settings, all this tool does is edit your Windows Registry file and create an icon for that particular instance of IE. You can also use IEController for any application that accesses similar protocols and tools as does IE. This means you can also secure other browsers as well, which is very handy. If it sounds a bit confusing, it’s not, once you see it in action. Let’s see how this works.

    Step 1: Download and extract

    The first thing you have to do is download the IEController Zip File and extract this file somewhere on your system. Unpack that file and you will see the IEController icon. You can always pin this icon to the start menu for quick access.

    Step 2: Run IEController

    Double click on the IEController icon to start up the application. The application consists of a single window housing multiple tabs (Figure A). Each of these tabs handles a different aspect of IE security.

    Figure A

    You will only see this menu the first time you open an application with IEController. So you will want to make sure you choose your settings wisely.

    Step 3: Walk through the tabs

    There are nine tabs, seven of which directly impact the security of Internet Explorer (with the only exceptions being the Configuration and the Log tab). The tabs are as follows:

    Configuration

    This tab is where you set up the icons you will use for your various applications. After you make all of your configurations you will come back to this tab and then click the Create Configuration Icon button which will then place an icon for that configuration on your desktop.

    Active X

    This one is the big one. As you can see (Figure B), this tab can control a number of the less secure IE features.

    Figure B

    What you are looking at is the default ActiveX settings in IEController. Add or remove them as per your requirements.

    If you click on the Expert Settings button a new window will open allowing you to create unique allowed and disallowed objects. For this you will need the objects CLSID.

    Programs

    From this tab (Figure C) you can control which external applications IE can access. Although the list seems a bit on the small side, you can click on the Expert Settings button and create your own application listings to select from.

    Figure C

    To create your own, click the Expert Settings, then choose either black or white list, right click the pane associated with the list you want to use and select New Entry. The rest is simple.

    Files

    From this tab (Figure D), you can control what files IE can access. For the most part, this should be self-explanatory.

    Figure D

    Just remember that anything checked is allowed. By default all items are set to allow.

    Internet

    This tab (Figure E) has some very interesting and powerful options available. From inbound to outbound TCP connections, to Verisign redirects and ad servers you can control seriously contain IE from this tab.

    Figure E

    Click the Expert Settings button and you can even create black/white lists of sites that IE can and cannot connect to.

    Privacy

    From this tab (Figure F) you can set keywords associated with sensitive data in order to prevent certain pieces of information from being transmitted unknowingly. In order to set this you have to click the check box and then manually add keywords for IE to watch for.

    Figure F

    To create a new entry on this tab, right-click the blank area and select New Entry from the menu.

    Registry

    This tab (Figure G) is quite important. From here you can disallow write access to the registry. That alone is worth the price of admission. Of course this tab allows for the configuration of more than just registry settings. You can also set this up such that IE cannot modify the Internet connection as well as register programs for autostart.

    Figure G

    By default IE has write access to the registry. If you want to change this, click the box next to Disable write access to registry.

    Miscellaneous

    The final tab (Figure H) offers a few settings not related to any other tab. I have yet to use any configuration from this tab, but you might want to change the System logging function to Disallow to aid in the prevention of spyware.

    Figure H

    Do not uncheck the Always notify dangerous actions or else you risk bad things happening without you knowing.

    Step 4: Create your icon

    When you have finally finished your configuration, go back to the Configuration tab and click the Create Configuration Icon and then click the Start button. A new icon will appear on your desktop and IE will start with your configuration options set. Now, every time you start IE from that icon it will run with the same configuration. If, however, you run IE from the normal means, it will run with the default configuration.

    Final thoughts

    That’s it! You’ve set up IE as a more secure browser. You can also do this with other applications by simply dragging their icon onto the IEController icon. The IEController application will start and set options for that application. Just remember, you only see that configuration window the FIRST time you run an application with IEController.

    IEController is certainly worth a look if you must use Internet Explorer. When you set IE up with this tool you will find it far more secure than the default.

    Read and post comments | Send to a friend

    Advertisements

    About skicat56

    Snow Sports Industry veteran – Husband – Father – Network IT Ninja & Former Powncer. Old enough to know better but young enough to start a new career.
    This entry was posted in Security, Software, Tips-n-Tricks and tagged , , , , , , . Bookmark the permalink.

    Leave a Reply

    Fill in your details below or click an icon to log in:

    WordPress.com Logo

    You are commenting using your WordPress.com account. Log Out / Change )

    Twitter picture

    You are commenting using your Twitter account. Log Out / Change )

    Facebook photo

    You are commenting using your Facebook account. Log Out / Change )

    Google+ photo

    You are commenting using your Google+ account. Log Out / Change )

    Connecting to %s