Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

Executive Summary
Who Should Read This Guide
Skills and Readiness
Guide Purpose and Scope
Microsoft Guidance and the FDCC
Chapter Summaries
Style Conventions
Support and Feedback
Development Team
Contributors and Reviewers
Chapter 1: Implementing the Security
Enterprise Client Environment
Specialized Security
Limited Functionality
Restricted network access
Restricted Services and Data Access
Restricted Network Access
Strong Network Protection
Security Design
y OU Design for Security Policies
y GPO Design for Security Policies
OU Design for Security Policies
Domain Root
Domain Controllers OU
Member Servers OU
Server Role OUs
Department OU
Windows 7 Users OU
Windows 7 Computers OU
GPO Design for Security Policies
Recommended GPOs
Password Policy Settings
How to Make Users Change Passwords Only When
Account Lockout Policy Settings
Computer Policy Settings
y Audit Policy Settings
Audit Policy Settings
User Rights Assignment Settings
Security Options Settings
MSS Settings
Potential Issues with SMB Signing Policies
Reducing the Use of NTLM Authentication
Event Log Security Settings
Windows Firewall with Advanced Security
\Windows Firewall with Advanced Security
Domain Profile
Private Profile
Public Profile
Computer Configuration\Administrative Templates
y Windows Update
Windows Update
More Information
Chapter 2: Defend Against Malware
Windows 7 Defense Technologies
y Action Center
Action Center
User Account Control
Mitigation Considerations
Mitigation Process
Biometric Security
Windows Defender
Microsoft SpyNet Community
Malicious Software Removal Tool
Windows Firewall
Software Restriction Policies
Chapter 3: Protect Sensitive Data
Optimize Cryptographic Randomization
BitLocker Drive Encryption
Protecting Operating System and Fixed Data Drives
Using Group Policy to Mitigate Risk for BitLocker
Protecting Removable Data Drives
Encrypting File System
Risk Assessment
Risk Mitigation
Specific Mitigation Steps for EFS
Rights Management Services
Managing RMS Using Group Policy
Device Management and Installation
Using Group Policy to Control Device Installation
Using Group Policy to Control Device Usage
Using Group Policy to Control AutoPlay and AutoRun
Application Compatibility Testing
Known Application Compatibility Issues
Security Enhancements
Operating System Changes and Innovations
Tools and Resources
Program Compatibility Assistant
Program Compatibility Wizard
0 of .
Results for:
No results containing your search query
P. 1
Windows 7 Security Guide

Windows 7 Security Guide

Ratings: (0)|Views: 648|Likes:

More info:

Published by: Ernesto Franco Tinoco on Feb 14, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as DOCX, PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 5 to 23 are not shown in this preview.
You're Reading a Free Preview
Pages 28 to 89 are not shown in this preview.

Activity (4)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
scribd01010101 liked this
gstech102692 liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->