Date Published: October 2008
Supersedes: SP 800-68 (October 2005)
Author(s)
Karen Scarfone (NIST), Murugiah Souppaya (NIST), Paul Johnson (BAH)
This publication assists IT professionals in securing Windows XP workstations, mobile computers, and computers used by telecommuters within various environments. The recommendations are specifically intended for Windows XP Professional systems running Service Pack 2 or 3. SP 800-68 Revision 1 provides detailed information about the security features of Windows XP and security configuration guidelines. The publication recommends and explains tested, secure settings with the objective of simplifying the administrative burden of improving the security of Windows XP systems in five types of environments: small office/home office, enterprise, specialized security-limited functionality, legacy, and Federal Desktop Core Configuration (FDCC).
This publication assists IT professionals in securing Windows XP workstations, mobile computers, and computers used by telecommuters within various environments. The recommendations are specifically intended for Windows XP Professional systems running Service Pack 2 or 3. SP 800-68 Revision 1...
See full abstract
This publication assists IT professionals in securing Windows XP workstations, mobile computers, and computers used by telecommuters within various environments. The recommendations are specifically intended for Windows XP Professional systems running Service Pack 2 or 3. SP 800-68 Revision 1 provides detailed information about the security features of Windows XP and security configuration guidelines. The publication recommends and explains tested, secure settings with the objective of simplifying the administrative burden of improving the security of Windows XP systems in five types of environments: small office/home office, enterprise, specialized security-limited functionality, legacy, and Federal Desktop Core Configuration (FDCC).
Hide full abstract
Keywords
Windows security; Windows XP security; host security;
Federal Desktop Core Configuration
Control Families
Access Control;
Audit and Accountability;
Configuration Management;
Identification and Authentication;
Maintenance;
System and Communications Protection;
System and Information Integrity;
System and Communications Protection;