Back to Results
First PageMeta Content
Windows XP / Active Directory / Federal Desktop Core Configuration / Windows Vista / Windows / Group Policy / Encrypting File System / Administrative Template / Internet Explorer / Microsoft Windows / Software / System software


Guide to Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist
Add to Reading List

Document Date: 2012-02-10 09:33:52


Open Document

File Size: 1,37 MB

Share Result on Facebook

Company

Updating Existing Systems / SP3-Specific Resources / F.6 Other Web-Based Resources / F-2 Microsoft Web-Based Resources / Specialized Security-Limited Functionality Systems / Antispyware Software / General Security Resources / Booz Allen Hamilton / NIST / General Windows XP Resources / F-1 Print Resources / Wells Fargo Bank / Microsoft Corporation / Backing Up Systems / Windows XP Systems / /

Country

United States / /

Facility

National Institute of Standards and Technology / Computer Systems Technology The Information Technology Laboratory / /

IndustryTerm

broadband networks / standards infrastructure / security settings to their systems / Web Browsers / legacy services / Internet Connection Sharing / network security devices / software configurations / Internet Protocol Security / legacy systems / information technology / telecommuter systems / Internet Explorer / /

OperatingSystem

Windows Vista / Windows XP Professional / XP / Windows XP / Windows 2000 / Microsoft Windows / Windows NT / Microsoft Vista / /

Organization

Defense Information Agency / NIST’s FDCC / United States Air Force / NIST SP / National Security Agency / Internal Revenue Service / U.S. Department of Commerce / Institute of Standards and Technology Gaithersburg / Defense Information Systems Agency / Department of Energy / Department of Homeland Security Guide / Center for Internet Security / National Institute of Standards and Technology / Social Security Administration / African Union / Los Angeles Department of Water and Power / Information Technology Laboratory / Department of Homeland Security / /

Person

GUIDE TO SECURING / Nathan Look / Larry Keys / Tim Grance / Dean Farrington / Carlos M. Gutierrez / John Wack / James McKeithen / Arnold Johnson / Murugiah Souppaya / Kathy Ton-nu / Kurt Dillard / Robert Chang / Richard Park / Chris Enloe / Karen Kent / Paul M. Johnson / Patrick D. Gallagher / Peter Tracy (Belarc) / W. Warren Pearce / Anthony Harris / Karen Scarfone / Blair Heiserman / /

Position

MP / Secretary / IT PROFESSIONALS Executive / Deputy Director / Contents Executive / /

Product

Microsoft Corporation Portable Audio Device / Windows XP / Outlook Express / Microsoft Office / B-1 / C-1 C.2 / Explorer / Outlook / C-1 C.1 / Windows Vista / C-2 C.3 / Microsoft Word / /

ProgrammingLanguage

R / C / /

ProvinceOrState

Maryland / /

Technology

telecommuting / Control Network / broadband / Information Technology / IP / operating system / TCP/IP / Wi-Fi / mobile devices / Firewall / Antivirus Software / /

URL

http /

SocialTag