When an IT security configuration checklist (e.g., hardening or lockdown guide) is applied to a system in combination with trained system administrators and a sound and effective security program, a substantial reduction in vulnerability exposure can be achieved. This guide will assist personnel responsible for the administration and security of Windows XP systems. It contains information that can be used to secure local Windows XP workstations, mobile computers, and telecommuter systems more effectively in a variety of environments, including small office, home office and managed enterprise environments. The guidance should only be applied throughout an enterprise by trained and experienced system administrators. Illustrations.For example, EFS may be a solution for securing data on mobile laptops that are at high risk of being stolen or lost and ... On systems that are using EFS, Syskey should also be used to establish a startup key that protects the private keys used for ... An administrator can reconfigure Syskey to store the random key on a floppy disk instead of the local system, or to specify ... Windows XP includes a command-line utility called cipher that is intended for use with EFS, but can also be usedanbsp;...
|Title||:||Guide to Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist|
|Publisher||:||DIANE Publishing - 2009-08|