Browser configuration

Microsoft Internet Explorer browser requires in certain cases special analysis and configuring since some setting values selected by the user or set by default may cause security problems.

Here are some examples of the objects and parameters used in the browser and how they are associated with potential security threats:

  • Microsoft Internet Explorer cache. The cache stores data downloaded from the Internet, which allows not to download them next time. This speeds up the download time of your web pages and reduces Internet traffic. In addition to that, the cache contains confidential data, from which a history of websites visited by the user can also be obtained. Some malware objects also scan the cache while scanning the disk, and intruders can obtain, for example, the user’s email addresses. You are advised to clear the cache every time you close your browser to improve the protection.
  • Display of known file types extensions. To edit file names conveniently you can disable showing their extensions. Nevertheless, it is sometimes useful to see the file extension. File names of many malicious objects contain combinations of symbols imitating an additional file extension before the real one (e.g., example.txt.com). If the real file extension is not displayed, users can see just the file name part with the imitated extension and so they can identify a malicious object as a harmless file. To improve protection, you are advised to enable the display of files of known formats.
  • List of trusted websites. For some websites to run correctly, you should add them to the list of trusted sites. At the same time, malicious objects can add to this list links to websites created by intruders.

Note that some settings may lead to problems with displaying certain websites (for example if they use ActiveX controls). This problem can be solved by adding these websites to the trusted zone.

Browser analysis and configuration are performed in the Browser Configuration Wizard. The wizard checks whether the latest browser updates are installed and makes sure that the current browser settings do not make the system vulnerable to malicious exploits. Once the Wizard is complete, a report is generated which can be sent to Kaspersky Lab for analysis.

The wizard consists of a series of screens (steps) navigated using the Back and Next buttons. To close the wizard once it completes its work, use the Finish button. To stop the wizard at any stage, use the Cancel button.

Close all Microsoft Internet Explorer windows before starting the diagnostics.

To start the Browser Configuration Wizard:

  1. Open the main application window and select the Tools section in the left part of the window.
  2. Click the Browser Configuration button in the right part of the window.

Detailed discussion of the wizard steps.

Starting the Wizard

Make sure the option Perform diagnostics for Microsoft Internet Explorer is selected and click the Next button to start the Wizard.

Microsoft Internet Explorer settings analysis

The Wizard analyzes the settings of Microsoft Internet Explorer. Searching the browser settings for problems may take some time. Once the search is complete, the Wizard will proceed automatically to the next step.

Selecting actions to configure the browser

The problems found during the previous step are presented in groups, based on the type of danger that they pose.

To view the actions within a group, click the + icon to the left of the group name.

To make the Wizard perform a certain action, check the box to the left of the corresponding action name. By default, the Wizard performs all recommended and strongly recommended actions. If you do not wish to perform a certain action, uncheck the box next to it.

Unchecking the boxes selected by default is strongly discouraged because doing so will leave your computer vulnerable.

Having defined the set of actions, which the Wizard will perform, click the Next button.

Browser configuration

The Wizard will perform the actions selected during the previous step. Browser configuration may take some time. Once configuring is complete, the Wizard proceeds automatically to the next step.

Closing the Wizard

Click the Finish button to close the Wizard.

See also:

Rolling back the changes, made by the wizards

Internet Security arr Browser configurationPage top

Browser configuration