Configuring Browsers
Most computers, including corporate workstations, are used to access the Internet. This means that proper browser configuration is absolutely essential for hardening a system. The Internet is probably the single greatest threat to an individual system or a corporate network. Safe use of the Internet is critical. This section describes how to set Internet Explorer for safe Internet use.
Securing Browser Settings for Microsoft Edge
Because Microsoft Edge is the default browser in Windows 10 and 11, it is a commonly used browser. Therefore, it is important to adequately secure this browser. Here are the steps to follow:
Open Microsoft Edge.
Select the ellipsis (…) in the upper-right corner and then select Settings. This is shown in Figure 8-13.
FIGURE 8-13 Finding edge settings
Figure 8-14 shows the Settings screen.
FIGURE 8-14 Edge settings
Under Privacy, Search, and Services, you have several options, as shown in Figure 8-15.
FIGURE 8-15 Edge privacy settings
The first thing you can do on this screen is to set general tracking to Basic, Balanced, or Strict; however, if you scroll down, you will also have options to clear data when you exit the browser. This can be an invaluable privacy tool. As you continue to scroll down, you will see other settings, including the security settings, as shown in Figure 8-16.
FIGURE 8-16 Edge security settings
Using the Microsoft Edge settings properly can allow you to find the right balance between security and ease of use. This will always be a bit of a trade-off. The more strict security is, the less user friendly the system is.
Secure Settings for Firefox
Mozilla Firefox is a popular and free browser that is available for Windows, macOS, Linux, Android, and iOS (https://www.mozilla.org/en-US/firefox/new/). The first step is to click the upper-right corner and find Settings, as shown in Figure 8-17.
FIGURE 8-17 Finding firefox settings
Under Settings, you will find Privacy & Security. Much like in Edge, you can choose general classifications. With Firefox, those classifications are Standard, Strict, and Custom, as shown in Figure 8-18.
FIGURE 8-18 Firefox browser privacy
As you scroll down the screen, you will find options for clearing history, automatically clearing history, whether to autofill data, and more. As with any browser, it will take a bit of thought to find exactly the correct balance. Firefox does offer one exciting option that Edge does not: add-ons. If you choose Add-ons and themes from the same menu where you found Settings, you will be taken to a screen that allows you to select all sorts of add-ons for the browser. As an example, there are numerous privacy add-ons that can help protect your browsing privacy, as shown in Figure 8-19.
FIGURE 8-19 Firefox browser add-ons
You might be wondering how you can be certain these add-ons are safe. First, be aware that Mozilla will remove any add-ons it suspects of not being safe. Second, look for how many users an add-on has. The more users, the less likely the add-on could have some malicious purpose that hasn’t been detected.
Secure Settings for Chrome
Chrome is another free browser available for multiple operating systems (https://www.google.com/chrome/). The settings are found in the upper-right corner, as shown in Figure 8-20.
FIGURE 8-20 Chrome settings
Under Settings, you will find Privacy and Security, as shown in Figure 8-21.
FIGURE 8-21 Chrome privacy and security
There are settings to determine how the browser handles cookies, how the browser shares data such as location, and the ability to clear browser data. You will also see a privacy guide, which will lead you through making your privacy settings. This is ideal for users who might not be technically proficient.
Other Browsers
In addition to Edge, Firefox, and Chrome, other available browsers include Opera, Safari (macOS), and IceCate (Linux only, default is Kali Linux). Each of these have different methods for setting up security, but the same principles that hold true for Edge, Firefox, and Chrome also apply to these browsers: Limit cookies, do not allow ActiveX components to run without your knowledge, and do not allow any scripts to execute without your knowledge. If you apply the same principles to other browsers, you should be able to achieve similar security to what you can have with Internet Explorer.