Words of Wisdom:

"It is not about when, it is just about when is the beginning." - Jessicahh

The Computer

  • Date Submitted: 02/04/2011 03:09 AM
  • Flesch-Kincaid Score: 38 
  • Words: 70788
  • Essay Grade: no grades
  • Report this Essay
Microsoft Solutions for Security and Compliance

Windows XP Security Guide

© 2006 Microsoft Corporation. This work is licensed under the Creative Commons Attribution-Non Commercial License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc/2.5/ or send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco, California, 94105, USA.

Contents

iv

Windows XP Security Guide

Feedback
The Microsoft Solutions for Security and Compliance team would appreciate your thoughts about this and other security solutions. Have an opinion? Let us know on the Security Solutions Blog for the IT Professional at http://blogs.technet.com/secguide. Or e-mail your feedback to the following address: secwish@microsoft.com. We look forward to hearing from you.

Chapter 1: Introduction to the Windows XP Security Guide
Overview
Welcome to the Windows XP Security Guide. This guide is designed to provide you with the best information available to assess and counter security risks that are specific to Microsoft® Windows® XP Professional with Service Pack 2 (SP2) in your environment. The chapters in this guide provide detailed information about how to configure enhanced security settings and features in Windows XP wherever possible to address identified threats in your environment. If you are a consultant, designer, or systems engineer who works in a Windows XP environment, this guide was designed with you in mind. Microsoft engineering teams, consultants, support engineers, partners, and customers have reviewed and approved the information in this guide to make it: • • • • • Proven. Based on field experience. Authoritative. Offers the best advice available. Accurate. Technically validated and tested. Actionable. Provides the steps to success. Relevant. Addresses real-world security concerns.

Best practices to secure both client and server computers were developed by consultants and systems engineers who have implemented...

Comments

Express your owns thoughts and ideas on this essay by writing a grade and/or critique.

  1. No comments