Security Compliance Management Toolkit Series v.


Monitor the Security Compliance of Your IT Environment for Computers Running WindowsThe Security Compliance Management Toolkit Series builds on previous Solution Accelerators to provide you with expanded best practices and additional automation tools to help configure and deploy security settings for the following operating systems and applications: WindowsdlT« 7, BitLockerd-OC?D? Drive Encryption, WindowsdlT« Internet ExplorerdlT« 8, Windows ServerdlT« 2008, Windows ServerdlT« 2003 Service Pack 2 (SP2), Windows VistadlT« SP1, Windows XPdlT« Professional SP3, and 2007 Microsoft Office SP1.After deploying the security settings, you can verify the accuracy of the setting policies and monitor policy changes by using the desired configuration management (DCM) feature of Microsoft System Center Configuration Manager 2007 R2.This series includes Security Compliance Management Toolkits for the following products: * Windows 7 * Internet Explorer 8 * Windows Server 2008 * Windows Server 2003 * Windows Vista * Windows XP * 2007 Microsoft OfficeNote: The GPOAccelerator tool is included with each toolkit download package.Toolkit ComponentsEach of the Security Compliance Management Toolkits includes the following components: * Security guide. Each toolkit includes an updated version of a previously released security guides for Windows 7, Windows Vista, Windows XP, Windows Server 2008, Windows Server 2003, Internet Explorer 8 or 2007 Microsoft Office. The guidance provides you with best practices and automated tools to help you plan and deploy your security baselines. * Attack Surface Reference workbook. A resource that lists the changes introduced as server roles are installed on computers running Windows Server 2003 and Windows Server 2008, for the toolkits specific to these operating systems. * Security Baseline Settings workbook. A resource that lists all of the prescribed settings for each of the preconfigured security baselines that the security guides recommend. * Security Baseline XML. XML files that allow your organization to consume the data defined in the security baseline settings workbooks. * GPOAccelerator tool. A tool that you can use to create all the Group Policy objects (GPOs) you need to deploy your chosen security configuration. This release also supports Windows Server 2003, and creating security configurations on machines not joined to a domain. * INF Files. INF files for Windows 7, Windows XP, Windows Vista, Windows Server 2003, Windows Server 2008. * Baseline Compliance Management Overview. The overview discusses best practices on how to monitor security baselines for Windows operating systems and Office applications. * DCM Configuration Pack User Guide. A step-by-step prescriptive user guide about how to use the Configurations Packs with the DCM feature in Configuration Manager 2007 R2. * DCM Configuration Packs. The toolkit series includes DCM configuration packs to use with the DCM feature in Configuration Manager 2007 R2.

Monitor the Security Compliance of Your IT ... This toolkit series provides IT professionals with an end-to-end solution to help them plan, deploy, and monitor security baselines of WindowsdlT« operating systems and 2007 MicrosoftdlT« Office applications.

windows, security, server, configuration, microsoft, management, operating, manager, feature, internet, vista, office

  • Security Compliance Management Toolkit Series
  • Microsoft Coporation
  • WinXP, Win2003, Win2000, Win Vista, Window2008, Windows 7
  • Freeware
  • 11.31 Mb
  • 231
  • Free

Review Security Compliance Management Toolkit Series

  • captcha

Other software of Microsoft Coporation

New Security software
  • KeepLock  v.1.1.3KeepLock is a free security app. You can lock important apps, system settings, and even your gallery. You can also prevent your children from making in-app purchases by accident, or deleting important information.
  • PWMinder Desktop  v.3.1.3PWMinder is a Password Manager that is used to store passwords and other sensitive data in a secure encrypted file. Includes a configurable Password Generator, Encryption Tool and ability to automatically log in to web sites.
  • HT System Administrator  v.15.3.3Block unwanted computer activities and increase productivity as simply as possible. With HT System Administrator, block any websites/applications and view reports of computer use in a few clicks.